-
1
-
-
32444435813
-
Radio frequency identification (RFID)
-
Roberts, C. M., "Radio frequency identification (RFID)," Computers and Security, vol. 25, no. 1, pp. 18-26, 2006.
-
(2006)
Computers and Security
, vol.25
, Issue.1
, pp. 18-26
-
-
Roberts, C.M.1
-
2
-
-
10244234065
-
RFID technologies: Supply-chain applications and implementation issues
-
Angeles, R., "RFID technologies: supply-chain applications and implementation issues," Information Systems Management, vol. 22, no. 1, pp. 51-65, 2005. (Pubitemid 39618345)
-
(2005)
Information Systems Management
, vol.22
, Issue.1
, pp. 51-65
-
-
Angeles, R.1
-
3
-
-
50249109611
-
Improving supply chain visibility through RFID data
-
Melski, A., J. Müller, A. Zeier, and M. Schumann, "Improving supply chain visibility through RFID data," in Proceedings of the the IEEE 24th International Conference on Data Engineering Workshop (ICDEW'08), Cancun, Mexico, Apr. 7-12, 2008, pp. 102-103.
-
Proceedings of the the IEEE 24th International Conference on Data Engineering Workshop (ICDEW'08), Cancun, Mexico, Apr. 7-12, 2008
, pp. 102-103
-
-
Melski, A.1
Müller, J.2
Zeier, A.3
Schumann, M.4
-
4
-
-
33750290259
-
YA-TRAP: Yet another trivial RFID authentication protocol
-
DOI 10.1109/PERCOMW.2006.152, 1599066, Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
-
Tsudik, G., "YA-TRAP: Yet another trivial RFID authentication protocol," in Proceedings of the Fourth IEEE Annual International Conference on Pervasive Computing and Communications Workshops (Per-ComW 2006), Pissa, Italy, Mar. 13-17, 2006, pp. 643-646. (Pubitemid 44612661)
-
(2006)
Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
, vol.2006
, pp. 640-643
-
-
Tsudik, G.1
-
5
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Feldhofer, M., S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Proceedings of the Sixth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), Cambridge, MA, USA, Aug. 11-13, 2004, pp. 357-370.
-
Proceedings of the Sixth International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), Cambridge, MA, USA, Aug. 11-13, 2004
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
6
-
-
84865498114
-
Towards securing low-cost RFID systems: An unconditionally secure approach
-
Alomair, B., L. Lazos, and R. Poovendran, "Towards securing low-cost RFID systems: an unconditionally secure approach," in Proceedings of the 2010 Workshop on RFID Security (RFIDsec'10 Asia), Singapore, Feb. 22-23, 2010, pp. 1-17.
-
Proceedings of the 2010 Workshop on RFID Security (RFIDsec'10 Asia), Singapore, Feb. 22-23, 2010
, pp. 1-17
-
-
Alomair, B.1
Lazos, L.2
Poovendran, R.3
-
7
-
-
33745621564
-
Reducing time complexity in RFID systems
-
Avoine, G., E. Dysli, and P. Oechslin, "Reducing time complexity in RFID systems," in Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography (SAC'05), Kingston, ON, Canada, Aug. 11-12, 2005, pp. 291-306.
-
Proceedings of the 12th Annual Workshop on Selected Areas in Cryptography (SAC'05), Kingston, ON, Canada, Aug. 11-12, 2005
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
8
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Molner, D. and D. Wagner, "Privacy and security in library RFID: Issues, practices, and architectures," in Proceedings of the 11th ACM conference on Computer and communications security (CCS'04), Washington DC, USA, Oct. 25-29, 2004, pp. 210-219.
-
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04), Washington DC, USA, Oct. 25-29, 2004
, pp. 210-219
-
-
Molner, D.1
Wagner, D.2
-
9
-
-
84892446001
-
-
available at
-
Crypto++ Benchmarks, available at http://www.cryptopp.com/benchmarks. html.
-
Crypto++ Benchmarks
-
-
-
10
-
-
78751692235
-
-
DemoTag, http://www.iaik.tugraz.at/content/research/rfid/tag-emulators/.
-
DemoTag
-
-
-
11
-
-
78751697006
-
-
ISO 18000-6C
-
ISO 18000-6C, http://www.iso.org/iso/iso-catalogue/catalogue-tc/ catalogue-detail.htm?csnumber=34117.
-
-
-
-
13
-
-
37149045263
-
PRESENT: An ultra-lightweight block cipher
-
Bogdanov, A., L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, "PRESENT: An ultra-lightweight block cipher," in Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), Vienna, Austria, Oct. 10-13, 2007, pp. 450-466.
-
Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), Vienna, Austria, Oct. 10-13, 2007
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.R.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.J.B.6
Seurin, Y.7
Vikkelsoe, C.8
-
14
-
-
33750067948
-
M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
-
Peris-Lopez, P., J. C. Hernández-Castro, J. M. Estévez-Tapiador, and A. Ribagorda, "M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags," in Proceedings of the Third International Conference on Ubiquitous Intelligence and Computing (UIC06), Wuhan, China, Sep. 3-6, 2006, pp. 912-923.
-
Proceedings of the Third International Conference on Ubiquitous Intelligence and Computing (UIC06), Wuhan, China, Sep. 3-6, 2006
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernández-Castro, J.C.2
Estévez-Tapiador, J.M.3
Ribagorda, A.4
-
16
-
-
78751690335
-
-
Rowley CrossWorks, http://www.rowley.co.uk/avr/index.htm.
-
Rowley CrossWorks
-
-
-
17
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Weis, S. A., S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Proceedings of the First International Conference on Security in Pervasive Computing (SPC 2003), Boppard, Germany, Mar. 12-14, 2003, pp. 201-212.
-
Proceedings of the First International Conference on Security in Pervasive Computing (SPC 2003), Boppard, Germany, Mar. 12-14, 2003
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
18
-
-
67650146044
-
Two blocking algorithms on adaptive binary splitting: Single and pair resolutions for RFID tag identification
-
Lai, Y.-C. and C.-C. Lin, "Two blocking algorithms on adaptive binary splitting: Single and pair resolutions for RFID tag identification," IEEE/ACM Transactions on Networking, vol. 17, no. 3, pp. 962-975, 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.3
, pp. 962-975
-
-
Lai, Y.-C.1
Lin, C.-C.2
-
19
-
-
78751689099
-
Leightweight authentication protocols for low-cost RFID tags
-
Vajda, I. and L. Buttyán, "Leightweight authentication protocols for low-cost RFID tags," in Proceedings of the Fifth International Conference on Ubiquitous Computing (UbiComp 2003), Seattle, WA, USA, Oct. 12-15, 2003.
-
Proceedings of the Fifth International Conference on Ubiquitous Computing (UbiComp 2003), Seattle, WA, USA, Oct. 12-15, 2003
-
-
Vajda, I.1
Buttyán, L.2
-
20
-
-
33749379761
-
Mutual authentication protocol for low-cost RFID
-
Yang, J., J. Park, H. Lee, K. Ren, and K. Kim, "Mutual authentication protocol for low-cost RFID," in Proceedings of the Workshop on RFID and Lightweight Crypto, Graz, Austria, Jul. 14-15, 2005, pp. 17-24.
-
Proceedings of the Workshop on RFID and Lightweight Crypto, Graz, Austria, Jul. 14-15, 2005
, pp. 17-24
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
-
21
-
-
51049092732
-
Hash functions and RFID tags: Mind the gap
-
Bogdanov, A., G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, and Y. Seurin, "Hash functions and RFID tags: Mind the gap," in Proceedings of the 10th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2008), Washington, DC, USA, Aug. 10-13, 2008, pp. 283-299.
-
Proceedings of the 10th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2008), Washington, DC, USA, Aug. 10-13, 2008
, pp. 283-299
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.J.B.5
Seurin, Y.6
-
22
-
-
78751683177
-
Maximalist cryptography and computation on the WISP UHF RFID tag
-
Chae, H.-J., D. J. Yeager, J. R. Smith, and K. Fu, "Maximalist cryptography and computation on the WISP UHF RFID tag," in The Conference on RFID Security 2007 (RFIDSec 07), Malaga, Spain, Jul. 11-13, 2007.
-
The Conference on RFID Security 2007 (RFIDSec 07), Malaga, Spain, Jul. 11-13, 2007
-
-
Chae, H.-J.1
Yeager, D.J.2
Smith, J.R.3
Fu, K.4
-
23
-
-
33750345292
-
A wirelessly-powered platform for sensing and computation
-
Smith, J. R., A. P. Sample, P. S. Powledge, S. Roy, and A. Mamishev, "A wirelessly-powered platform for sensing and computation," in Proceedings of the Eighth International Conference on Ubiquitous Computing (Ubicomp 2006), Orange County, CA, USA, Sep. 17-21, 2006, pp. 495-506.
-
Proceedings of the Eighth International Conference on Ubiquitous Computing (Ubicomp 2006), Orange County, CA, USA, Sep. 17-21, 2006
, pp. 495-506
-
-
Smith, J.R.1
Sample, A.P.2
Powledge, P.S.3
Roy, S.4
Mamishev, A.5
-
24
-
-
0001826463
-
The RC5 encryption algorithm
-
Rivest, R. L., "The RC5 encryption algorithm," in Proceedings of the Second International Workshop on Fast Software Encryption (FSE94), Leuven, Belgium, Dec. 14-16, 1994, pp. 86-96.
-
Proceedings of the Second International Workshop on Fast Software Encryption (FSE94), Leuven, Belgium, Dec. 14-16, 1994
, pp. 86-96
-
-
Rivest, R.L.1
-
25
-
-
78751694609
-
Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling
-
Ransford, B., S. Clark, M. Salajegheh, and K. Fu, "Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling," in USENIX Workshop on Power Aware Computing and Systems (HotPower 2008), San Diego, CA, USA, Dec. 7, 2008.
-
USENIX Workshop on Power Aware Computing and Systems (HotPower 2008), San Diego, CA, USA, Dec. 7, 2008
-
-
Ransford, B.1
Clark, S.2
Salajegheh, M.3
Fu, K.4
-
26
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
Henrici, D. and P. Müller, "Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers," in Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PerComW 2004), Orlando, FL, USA, Mar. 14-17, 2004, pp. 149-153.
-
Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PerComW 2004), Orlando, FL, USA, Mar. 14-17, 2004
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
27
-
-
47949110430
-
Privacy-preserving lightweight authentication protocol for low-cost RFID tags
-
Yu, S., K. Ren, and W. Lou, "Privacy-preserving lightweight authentication protocol for low-cost RFID tags," in Proceedings of the IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, USA, Oct. 29-31, 2007, pp. 1-7.
-
Proceedings of the IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, USA, Oct. 29-31, 2007
, pp. 1-7
-
-
Yu, S.1
Ren, K.2
Lou, W.3
|