-
1
-
-
76749106728
-
When Compromised Readers Meet RFID
-
Youm, H.Y., Jang, J. (eds.) WISA 2009. Springer, Heidelberg
-
Avoine, G., Lauradoux, C., Martin, T.: When Compromised Readers Meet RFID. In: Youm, H.Y., Jang, J. (eds.) WISA 2009. LNCS, vol. 5932, pp. 36-50. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5932
, pp. 36-50
-
-
Avoine, G.1
Lauradoux, C.2
Martin, T.3
-
2
-
-
26444478592
-
RFID Traceability: A Multilayer Problem
-
S. Patrick, A., Yung, M. (eds.) FC 2005. Springer, Heidelberg
-
Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125-140. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
3
-
-
33744939250
-
-
Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland September
-
Avoine, G.: Adversary Model for Radio Frequency Identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (September 2005)
-
(2005)
Adversary Model for Radio Frequency Identification
-
-
Avoine, G.1
-
4
-
-
34547687590
-
Defining Strong Privacy for RFID
-
IEEE Computer Society Press, Los Alamitos
-
Juels, A., Weis, S.: Defining Strong Privacy for RFID. In: International Conference on Pervasive Computing and Communications - PerCom 2007, New York City, New York, USA, pp. 342-347. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
International Conference on Pervasive Computing and Communications - PerCom 2007, New York City, New York, USA
, pp. 342-347
-
-
Juels, A.1
Weis, S.2
-
5
-
-
33749005411
-
Quantitative Evaluation of Unlinkable ID Matching Schemes
-
ACM Press, New York
-
Nohara, Y., Inoue, S., Baba, K., Yasuura, H.: Quantitative Evaluation of Unlinkable ID Matching Schemes. In: Workshop on Privacy in the Electronic Society - WPES, Alexandria, Virginia, USA, pp. 55-60. ACM Press, New York (2006)
-
(2006)
Workshop on Privacy in the Electronic Society - WPES, Alexandria, Virginia, USA
, pp. 55-60
-
-
Nohara, Y.1
Inoue, S.2
Baba, K.3
Yasuura, H.4
-
6
-
-
24944575863
-
Cryptographic Approach to "Privacy-Friendly" Tags
-
MIT, Massachusetts
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to "Privacy-Friendly" Tags. In: RFID Privacy Workshop. MIT, Massachusetts (2003)
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
7
-
-
38149085988
-
An efficient authentication protocol for rfid systems resistant to active attacks
-
Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. Springer, Heidelberg
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: An efficient authentication protocol for rfid systems resistant to active attacks. In: Denko, M.K., Shih, C.-s., Li, K.-C., Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (eds.) EUC-WS 2007. LNCS, vol. 4809, pp. 781-794. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4809
, pp. 781-794
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
8
-
-
50249161524
-
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Shamir, A.: SQUASH - A New MAC With Provable Security Properties for Highly Constrained Devices Such as RFID Tags. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 144-157. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 144-157
-
-
Shamir, A.1
-
10
-
-
38149038702
-
On Privacy Models for RFID
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
|