-
1
-
-
33144457479
-
RFID Security and Privacy: A Research Survey
-
Feb.
-
A. Juels, "RFID Security and Privacy: A Research Survey," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp.381-394, Feb. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
2
-
-
43449134072
-
Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems
-
May
-
S. Piramuthu, "Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems," IEEE Trans. on System, Man, and Cybernetics-Pact C: Applications and Reviews, vol. 38, no. 3, pp. 360-376, May, 2008.
-
(2008)
IEEE Trans. on System, Man, and Cybernetics-Pact C: Applications and Reviews
, vol.38
, Issue.3
, pp. 360-376
-
-
Piramuthu, S.1
-
3
-
-
21144438831
-
Security and Privacy Aspects of Low-cost Radio Frequency identification Systems
-
S. A. Weis, S. E. Sarma, R. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-cost Radio Frequency identification Systems," in Proc. 1st Security Pervasive Comp., 2003.
-
Proc. 1st Security Pervasive Comp., 2003
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.3
Engels, D.W.4
-
5
-
-
34247218520
-
RFID Mutual Authentication Scheme Based on Synchronized Secret Information
-
presented at the
-
S. Lee, T. Asano, and K. Kim, "RFID Mutual Authentication Scheme Based on Synchronized Secret Information," presented at the 2006 Symp. Crptography Info. Security (SCIS), Hiroshima, Japan, Jan. 2006.
-
2006 Symp. Crptography Info. Security (SCIS), Hiroshima, Japan, Jan. 2006
-
-
Lee, S.1
Asano, T.2
Kim, K.3
-
6
-
-
33749379761
-
Mutual Authetication Protocol for Low-cost RFID
-
J. Yang, J. Park, H. Lee, K. Ren, and K. Kim, "Mutual Authetication Protocol for Low-cost RFID," in Proc. Workshop RFID Lightweight Cryptography, pp. 17-24, 2005.
-
(2005)
Proc. Workshop RFID Lightweight Cryptography
, pp. 17-24
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
-
7
-
-
78751513356
-
EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID Tags
-
P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador, and A. Ribagorda, "EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID Tags," in Proc. OTM Federated Conf. and Workshop: IS Workshop, 2006.
-
Proc. OTM Federated Conf. and Workshop: IS Workshop, 2006
-
-
Lopez, P.P.1
Castro, J.C.H.2
Tapiador, J.M.E.3
Ribagorda, A.4
-
8
-
-
78751534091
-
LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags
-
presented at the
-
P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador, and A. Ribagorda, "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags," presented at the Workshop RFID Sec., Graz, Austria, 2006.
-
Workshop RFID Sec., Graz, Austria, 2006
-
-
Lopez, P.P.1
Castro, J.C.H.2
Tapiador, J.M.E.3
Ribagorda, A.4
-
9
-
-
33750067948
-
M2AP: A Minimalist Mutual-authentication Protocol for Low-cost RFID Tags
-
Proc. Int. Conf. Ubiquitous Intell. Comp. (UIC2006), Berlin, Germany: Springer-Verlag
-
P. P. Lopez, J. C. H. Castro, J. M. E. Tapiador, and A. Ribagorda, "M2AP: A Minimalist Mutual-authentication Protocol for Low-cost RFID Tags," in Proc. Int. Conf. Ubiquitous Intell. Comp. (UIC2006), vol. 4159, Lecture Notes in Computer Science, Berlin, Germany: Springer-Verlag, pp. 912-923, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4159
, pp. 912-923
-
-
Lopez, P.P.1
Castro, J.C.H.2
Tapiador, J.M.E.3
Ribagorda, A.4
-
10
-
-
2942625823
-
Hash-based Enhancement of Location Privacy for Radio Frequency Identification Devices using Varying Identifiers
-
D. Henrici and P. Muller, "Hash-based Enhancement of Location Privacy for Radio Frequency Identification Devices using Varying Identifiers," in Proc. 1st Int. Workshop Pervasive Comp. Comm. Sec. (PerSec2004), pp. 149-153, 2004.
-
(2004)
Proc. 1st Int. Workshop Pervasive Comp. Comm. Sec. (PerSec2004)
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
11
-
-
14844294769
-
Privacy and Security in Library RFID: Issues, Practices, and Architectures
-
D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures," in Proc. of the 11th ACM Conf. on Comp. and Comm. Security (CCS'04), pp. 210-219, 2004.
-
(2004)
Proc. of the 11th ACM Conf. on Comp. and Comm. Security (CCS'04)
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
|