-
2
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Bonen, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5), 1897-1905 (1998).
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Bonen, D.1
Shaw, J.2
-
3
-
-
84877887414
-
-
McDaniel, P. (ed.) USENIX Security 05
-
Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security analysis of a cryptographically enabled RFID device. In: McDaniel, P. (ed.) USENIX Security 05, pp. 1-16 (2005).
-
(2005)
Security analysis of a cryptographically enabled RFID device
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
4
-
-
0013001552
-
Proactive security: long-term protection against break-ins
-
Canetti, R., Gennaro, R., Herzberg, A., Naor, D.: Proactive security: long-term protection against break-ins. RSA CryptoBytes 1(3), 1-8 (1997).
-
(1997)
RSA CryptoBytes
, vol.1
, Issue.3
, pp. 1-8
-
-
Canetti, R.1
Gennaro, R.2
Herzberg, A.3
Naor, D.4
-
5
-
-
78650969566
-
Secure communication for RFIDs. Proactive information security within computational security
-
Dallas, USA
-
Dolev, S., Kopeetsky, M.: Secure communication for RFIDs. Proactive information security within computational security. In: Eighth International Symposium on Stabilization, Safety, and Security of Distributed Systems, Dallas, USA (2006).
-
(2006)
Eighth International Symposium on Stabilization, Safety, and Security of Distributed Systems
-
-
Dolev, S.1
Kopeetsky, M.2
-
6
-
-
78650980286
-
Unique permutation hashing
-
Ben-Gurion University
-
Dolev, S., Lahiani, L., Haviv, Y.: Unique permutation hashing. Technical Report, Computer Science, Ben-Gurion University (2007).
-
(2007)
Technical Report, Computer Science
-
-
Dolev, S.1
Lahiani, L.2
Haviv, Y.3
-
7
-
-
78650974108
-
Method, apparatus and product for RFID authentication
-
September
-
Dolev, S., Kopeetsky, M., Shamir, A.: Method, apparatus and product for RFID authentication. Patent Application PCT/US2007/078167 (September 2007).
-
(2007)
Patent Application PCT/US2007/078167
-
-
Dolev, S.1
Kopeetsky, M.2
Shamir, A.3
-
10
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
Lecture Notes in Computer Science, C. Blundo and S. Cimato (Eds.), Berlin: Springer
-
Juels, A.: Minimalist cryptography for low-cost RFID tags. In: Blundo, C., Cimato, S. (eds.) Security in Communication Networks SCN 2004. Lecture Notes in Computer Science, vol. 3352, pp. 149-164. Springer, Berlin (2004).
-
(2004)
Security in Communication Networks SCN 2004
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
11
-
-
33749028998
-
Strengthening EPC tags against cloning
-
Juels, A.: Strengthening EPC tags against cloning. In: ACM Workshop on Wireless Security, pp. 67-76 (2005).
-
(2005)
ACM Workshop on Wireless Security
, pp. 67-76
-
-
Juels, A.1
-
12
-
-
33144457479
-
RFID security and privacy: a research survey
-
Juels, A.: RFID security and privacy: a research survey, IEEE J. Sel. Areas Commun. 24(2) (2006).
-
(2006)
IEEE J. Sel. Areas Commun
, vol.24
, Issue.2
-
-
Juels, A.1
-
14
-
-
84944878354
-
-
1st edn., Boca Raton: CRC Press
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, 1st edn. CRC Press, Boca Raton (1996).
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
van Oorschot, P.2
Vanstone, S.3
-
15
-
-
2942556410
-
Radio-frequency identification: security risks and challenges
-
Sarma, S. E., Weis, S. A., Engels, D. W.: Radio-frequency identification: security risks and challenges. RSA CryptoBytes 6(1) (2003).
-
(2003)
RSA CryptoBytes
, vol.6
, Issue.1
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
18
-
-
33744911390
-
On bluetooth repairing: key agreement based on symmetric key cryptography
-
Beijing, China
-
Vaudenay, S.: On bluetooth repairing: key agreement based on symmetric key cryptography. In: Proceedings of Conference on Information Security and Cryptology, pp. 1-9, Beijing, China (2005).
-
(2005)
Proceedings of Conference on Information Security and Cryptology
, pp. 1-9
-
-
Vaudenay, S.1
|