-
1
-
-
78650151843
-
On RFID privacy with mutual authentication and tag corruption
-
Zhou, J. (ed.) ACNS 2010 Springer, Heidelberg
-
Armknecht, F., Sadeghi, A.R., Visconti, I., Wachsmann, C.: On RFID privacy with mutual authentication and tag corruption. In: Zhou, J. (ed.) ACNS 2010. LNCS, vol. 6123, pp. 493-510. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6123
, pp. 493-510
-
-
Armknecht, F.1
Sadeghi, A.R.2
Visconti, I.3
Wachsmann, C.4
-
2
-
-
70349117963
-
-
Atmel Corporation: Innovative IDIC solutions (2007), http://www.atmel. com/dyn/resources/prod-documents/doc4602.pdf
-
(2007)
Innovative IDIC Solutions
-
-
-
3
-
-
33744957484
-
Adversarial model for radio frequency identification. ePrint
-
Avoine, G.: Adversarial model for radio frequency identification. ePrint, Report 2005/049 (2005)
-
(2005)
Report 2005/049
-
-
Avoine, G.1
-
5
-
-
84945138489
-
Identification protocols secure against reset attacks
-
Pfitzmann, B. (ed.) EUROCRYPT 2001 Springer, Heidelberg
-
Bellare, M., Fischlin, M., Goldwasser, S., Micali, S.: Identification protocols secure against reset attacks. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 495-511. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 495-511
-
-
Bellare, M.1
Fischlin, M.2
Goldwasser, S.3
Micali, S.4
-
6
-
-
57049171408
-
Improved security notions and protocols for non-transferable identification
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008 Springer, Heidelberg
-
Blundo, C., Persiano, G., Sadeghi, A.R., Visconti, I.: Improved security notions and protocols for non-transferable identification. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 364-378. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 364-378
-
-
Blundo, C.1
Persiano, G.2
Sadeghi, A.R.3
Visconti, I.4
-
7
-
-
76749128991
-
Efficient zero-knowledge identification schemes which respect privacy
-
ACM Press, New York
-
Bringer, J., Chabanne, H., Icart, T.: Efficient zero-knowledge identification schemes which respect privacy. In: Proceedings of ASIACCS 2009, pp. 195-205. ACM Press, New York (2009)
-
(2009)
Proceedings of ASIACCS 2009
, pp. 195-205
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
8
-
-
34748848124
-
Universally composable and forward-secure RFID authentication and authenticated key exchange
-
ACM Press, New York
-
Burmester, M., van Le, T., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Proc. of ASIACCS, pp. 242-252. ACM Press, New York (2007)
-
(2007)
Proc. of ASIACCS
, pp. 242-252
-
-
Burmester, M.1
Van Le, T.2
De Medeiros, B.3
-
9
-
-
0033723965
-
Resettable zero-knowledge (extended abstract)
-
Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable zero-knowledge (extended abstract). In: STOC, pp. 235-244 (2000)
-
(2000)
STOC
, pp. 235-244
-
-
Canetti, R.1
Goldreich, O.2
Goldwasser, S.3
Micali, S.4
-
10
-
-
77049116572
-
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks
-
Dolev, S. (ed.) ALGOSENSORS 2009 Springer, Heidelberg
-
D'Arco, P., Scafuro, A., Visconti, I.: Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. In: Dolev, S. (ed.) ALGOSENSORS 2009. LNCS, vol. 5804, pp. 76-87. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5804
, pp. 76-87
-
-
D'Arco, P.1
Scafuro, A.2
Visconti, I.3
-
12
-
-
79953728671
-
A new framework for RFID privacy. ePrint
-
Deng, R.H., Li, Y., Yao, A.C., Yung, M., Zhao, Y.: A new framework for RFID privacy. ePrint, Report 2010/059 (2010)
-
(2010)
Report 2010/059
-
-
Deng, R.H.1
Li, Y.2
Yao, A.C.3
Yung, M.4
Zhao, Y.5
-
13
-
-
38049110283
-
Instance-dependent verifiable random functions and their application to simultaneous resettability
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Deng, Y., Lin, D.: Instance-dependent verifiable random functions and their application to simultaneous resettability. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 148-168. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 148-168
-
-
Deng, Y.1
Lin, D.2
-
14
-
-
78650611667
-
-
(April 2008)
-
EPCglobal Inc.: (April 2008), http://www.epcglobalinc.org/
-
-
-
-
15
-
-
57049128814
-
Dismantling MIFARE Classic
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Garcia, F., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R.,Wichers Schreur, R., Jacobs, B.: Dismantling MIFARE Classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97-114. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 97-114
-
-
Garcia, F.1
De Koning Gans, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Wichers Schreur, R.6
Jacobs, B.7
-
17
-
-
67650699638
-
Resettably secure computation
-
Goyal, V., Sahai, A.: Resettably secure computation. In: EUROCRYPT, pp. 54-71 (2009)
-
(2009)
EUROCRYPT
, pp. 54-71
-
-
Goyal, V.1
Sahai, A.2
-
18
-
-
51049096802
-
RFID and its vulnerability to faults
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008 Springer, Heidelberg
-
Hutter, M., Schmidt, J.M., Plos, T.: RFID and its vulnerability to faults. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 363-379. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 363-379
-
-
Hutter, M.1
Schmidt, J.M.2
Plos, T.3
-
20
-
-
33144457479
-
RFID security and privacy: A research survey
-
Juels, A.: RFID security and privacy: A research survey. Journal of Selected Areas in Communication 24(2), 381-395 (2006)
-
(2006)
Journal of Selected Areas in Communication
, vol.24
, Issue.2
, pp. 381-395
-
-
Juels, A.1
-
21
-
-
34748832806
-
Defining strong privacy for RFID. ePrint
-
Juels, A., Weis, S.A.: Defining strong privacy for RFID. ePrint, Report 2006/137 (2006)
-
(2006)
Report 2006/137
-
-
Juels, A.1
Weis, S.A.2
-
24
-
-
84890863577
-
-
Springer, Heidelberg
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
-
(2007)
Power Analysis Attacks Revealing the Secrets of Smart Cards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
25
-
-
70350383766
-
New privacy results on synchronized RFID authentication protocols against tag tracing
-
Backes, M., Ning, P. (eds.) ESORICS 2009 Springer, Heidelberg
-
Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New privacy results on synchronized RFID authentication protocols against tag tracing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 321-336. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 321-336
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
26
-
-
57049184162
-
RFID privacy models revisited
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008 Springer, Heidelberg
-
Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: RFID privacy models revisited. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 251-256. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 251-256
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
27
-
-
78650161596
-
Readers behaving badly: Reader revocation in PKI-based RFID systems
-
Nithyanand, R., Tsudik, G., Uzun, E.: Readers behaving badly: Reader revocation in PKI-based RFID systems. ePrint, Report 2009/465 (2009)
-
(2009)
EPrint, Report 2009/465
-
-
Nithyanand, R.1
Tsudik, G.2
Uzun, E.3
-
28
-
-
78650604500
-
-
May
-
NXP Semiconductors: MIFARE (May 2007), http://mifare.net/
-
(2007)
NXP Semiconductors
-
-
-
29
-
-
78650619211
-
-
NXP Semiconductors April
-
NXP Semiconductors: MIFARE smartcard ICs (April 2010), http://www.mifare.net/products/smartcardics/
-
(2010)
MIFARE Smartcard ICs
-
-
-
30
-
-
70349118926
-
Mutual authentication in RFID: Security and privacy
-
ACM Press, New York
-
Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: Security and privacy. In: Proc. of ASIACCS, pp. 292-299. ACM Press, New York (2008)
-
(2008)
Proc. of ASIACCS
, pp. 292-299
-
-
Paise, R.I.1
Vaudenay, S.2
-
32
-
-
71549125572
-
Anonymizer-enabled security and privacy for RFID
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009 Springer, Heidelberg
-
Sadeghi, A.R., Visconti, I., Wachsmann, C.: Anonymizer-enabled security and privacy for RFID. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 134-153. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 134-153
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
34
-
-
70349088651
-
Location privacy in RFID applications
-
Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location- Based Applications Springer, Heidelberg
-
Sadeghi, A.R., Visconti, I.,Wachsmann, C.: Location privacy in RFID applications. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location- Based Applications. LNCS, vol. 5599, pp. 127-150. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5599
, pp. 127-150
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
35
-
-
85019715933
-
-
Springer, Heidelberg
-
Sadeghi, A.R., Visconti, I.,Wachsmann, C.: Enhancing RFID Security and Privacy by Physically Unclonable Functions. Springer, Heidelberg (2010)
-
(2010)
Enhancing RFID Security and Privacy by Physically Unclonable Functions
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
37
-
-
38149038702
-
On privacy models for RFID
-
Kurosawa, K. (ed.) ASIACRYPT 2007 Springer, Heidelberg
-
Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
38
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 50-59. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 50-59
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|