-
1
-
-
70349117963
-
-
Atmel Corporation: Innovative IDIC solutions (2007), http://www.atmel. com/dyn/resources/prod-documents/doc4602.pdf
-
(2007)
Innovative IDIC Solutions
-
-
-
2
-
-
71549116235
-
-
NXP Semiconductors (September)
-
NXP Semiconductors: MIFARE smartcard ICs (September 2008), http://www.mifare.net/products/smartcardics/
-
(2008)
MIFARE Smartcard ICs
-
-
-
3
-
-
80052993333
-
User privacy in transport systems based on RFID e-tickets
-
Sadeghi, A.R., Visconti, I., Wachsmann, C.: User privacy in transport systems based on RFID e-tickets. In: International Workshop on Privacy in Location-Based Applications, PiLBA (2008)
-
(2008)
International Workshop on Privacy in Location-Based Applications, PiLBA
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
5
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 50-59. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 50-59
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
6
-
-
33144457479
-
RFID security and privacy: A research survey
-
Juels, A.: RFID security and privacy: A research survey. Journal of Selected Areas in Communication 24(2), 381-395 (2006)
-
(2006)
Journal of Selected Areas in Communication
, vol.24
, Issue.2
, pp. 381-395
-
-
Juels, A.1
-
7
-
-
70349088651
-
Location privacy in RFID applications
-
Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. Springer, Heidelberg
-
Sadeghi, A.R., Visconti, I.,Wachsmann, C.: Location privacy in RFID applications. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol. 5599, pp. 127-150. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5599
, pp. 127-150
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
9
-
-
34547687590
-
Defining strong privacy for RFID
-
DOI 10.1109/PERCOMW.2007.37, 4144854, Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
-
Juels, A., Weis, S.A.: Defining strong privacy for RFID. In: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW '07), pp. 342-347. ACM Press, New York (2007) (Pubitemid 47214235)
-
(2007)
Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
10
-
-
34748848124
-
Universally composable and forward-secure RFID authentication and authenticated key exchange
-
DOI 10.1145/1229285.1229319, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
Burmester, M., van Le, T., de Medeiros, B.: Universally composable and forwardsecure RFID authentication and authenticated key exchange. In: Proc. of ASIACCS, pp. 242-252. ACM Press, New York (2007) (Pubitemid 47485405)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 242-252
-
-
Van Le, T.1
Burmester, M.2
De Medeiros, B.3
-
11
-
-
38149038702
-
On privacy models for RFID
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
12
-
-
70349118926
-
Mutual authentication in RFID: Security and privacy
-
ACM Press, New York
-
Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: Security and privacy. In: Proc. of ASIACCS, pp. 292-299. ACM Press, New York (2008)
-
(2008)
Proc. of ASIACCS
, pp. 292-299
-
-
Paise, R.I.1
Vaudenay, S.2
-
13
-
-
79953728671
-
-
ePrint, Report 2010/059
-
Deng, R.H., Li, Y., Yao, A.C., Yung, M., Zhao, Y.: A new framework for RFID privacy. ePrint, Report 2010/059 (2010)
-
(2010)
A New Framework for RFID Privacy
-
-
Deng, R.H.1
Li, Y.2
Yao, A.C.3
Yung, M.4
Zhao, Y.5
-
14
-
-
84890863577
-
-
Springer, Heidelberg
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
-
(2007)
Power Analysis Attacks Revealing the Secrets of Smart Cards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
15
-
-
51049096802
-
RFID and its vulnerability to faults
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
-
Hutter, M., Schmidt, J.M., Plos, T.: RFID and its vulnerability to faults. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 363-379. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 363-379
-
-
Hutter, M.1
Schmidt, J.M.2
Plos, T.3
-
16
-
-
79958073961
-
New methods for cost-effective side-channel attacks on cryptographic RFIDs
-
Kasper, T., Oswald, D., Paar, C.: New methods for cost-effective side-channel attacks on cryptographic RFIDs. In: Workshop on RFID Security, RFIDSec (2009)
-
(2009)
Workshop on RFID Security, RFIDSec
-
-
Kasper, T.1
Oswald, D.2
Paar, C.3
-
17
-
-
71549150422
-
Semi-destructive privacy in DoS-enabled RFID systems
-
D'Arco, P., Scafuro, A., Visconti, I.: Semi-destructive privacy in DoS-enabled RFID systems. In: Workshop on RFID Security, RFIDSec (2009)
-
(2009)
Workshop on RFID Security, RFIDSec
-
-
D'arco, P.1
Scafuro, A.2
Visconti, I.3
-
18
-
-
77049116572
-
Revisiting DoS attacks and privacy in RFIDenabled networks
-
Dolev, S. (ed.) ALGOSENSORS 2009. Springer, Heidelberg
-
D'Arco, P., Scafuro, A., Visconti, I.: Revisiting DoS Attacks and Privacy in RFIDEnabled Networks. In: Dolev, S. (ed.) ALGOSENSORS 2009. LNCS, vol. 5804, pp. 76-87. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5804
, pp. 76-87
-
-
D'arco, P.1
Scafuro, A.2
Visconti, I.3
-
19
-
-
57049184162
-
RFID privacy models revisited
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID privacy models revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 251-266. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 251-266
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
20
-
-
70350383766
-
New privacy results on synchronized RFID authentication protocols against tag tracing
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New privacy results on synchronized RFID authentication protocols against tag tracing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 321-336. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 321-336
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
21
-
-
76749128991
-
Efficient zero-knowledge identification schemes which respect privacy
-
ACM Press, New York
-
Bringer, J., Chabanne, H., Icart, T.: Efficient zero-knowledge identification schemes which respect privacy. In: Proceedings of ASIACCS '09, pp. 195-205. ACM Press, New York (2009)
-
(2009)
Proceedings of ASIACCS '09
, pp. 195-205
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
22
-
-
71549132040
-
Efficient RFID security and privacy with anonymizers
-
Sadeghi, A.R., Visconti, I., Wachsmann, C.: Efficient RFID security and privacy with anonymizers. In: Workshop on RFID Security, RFIDSec (2009)
-
(2009)
Workshop on RFID Security, RFIDSec
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
23
-
-
71549125572
-
Anonymizer-enabled security and privacy for RFID
-
Miyaji, A., Echizen, I., Okamoto, T. (eds.) CANS 2009. Springer, Heidelberg
-
Sadeghi, A.R., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: Miyaji, A., Echizen, I., Okamoto, T. (eds.) CANS 2009. LNCS, vol. 5888, pp. 134-153. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 134-153
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
25
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof-Systems. SIAM J. on Computing 18(6), 186-208 (1989)
-
(1989)
SIAM J. on Computing
, vol.18
, Issue.6
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
30
-
-
78650161596
-
Readers behaving badly: Reader revocation in PKI-based RFID systems
-
Nithyanand, R., Tsudik, G., Uzun, E.: Readers behaving badly: Reader revocation in PKI-based RFID systems. Cryptology ePrint Archive, Report 2009/465 (2009)
-
(2009)
Cryptology EPrint Archive, Report 2009/465
-
-
Nithyanand, R.1
Tsudik, G.2
Uzun, E.3
|