-
2
-
-
79951477289
-
Practical Security for RFID: Strong Authentication Protocols
-
S. Dominikus, E. Oswald, and M. Feldhofer. Practical Security for RFID: Strong Authentication Protocols. In Proceedings of D.A.C.H. Mobility 2006, October 17-18, 2006, Graz, Austria, pp. 187-200.
-
Proceedings of D.A.C.H. Mobility 2006, October 17-18, 2006, Graz, Austria
, pp. 187-200
-
-
Dominikus, S.1
Oswald, E.2
Feldhofer, M.3
-
3
-
-
57049128814
-
Dismantling MIFARE Classic
-
13th European Symposium on Research in Computer Security (ESORICS 2008), Malaga, Spain, 6-8 October, Springer
-
F. D. Garcia, G. de Koning Gans, R. Muijrers, P. van Rossum, R. Verdult, R. W. Schreur, and B. Jacobs. Dismantling MIFARE Classic. In 13th European Symposium on Research in Computer Security (ESORICS 2008), Malaga, Spain, 6-8 October, 2008, LNCS 5283, pp. 97-114. Springer.
-
(2008)
LNCS
, vol.5283
, pp. 97-114
-
-
Garcia, F.D.1
De Koning Gans, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
4
-
-
33847329743
-
An RFID Distance Bounding Protocol
-
IEEE Computer Society
-
G. Hancke and M. Kuhn. An RFID Distance Bounding Protocol. In 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), Athens, Greece, 5-9 September 2005, pp. 67-73. IEEE Computer Society.
-
1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), Athens, Greece, 5-9 September 2005
, pp. 67-73
-
-
Hancke, G.1
Kuhn, M.2
-
5
-
-
33751067978
-
Practical Attacks on Proximity Identification Systems
-
IEEE Computer Society
-
G. P. Hancke. Practical Attacks on Proximity Identification Systems. In IEEE Symposium on Security and Privacy (S&P 2006), Berkeley, California, USA, 21-24 May, 2006, pp. 328-333. IEEE Computer Society.
-
IEEE Symposium on Security and Privacy (S&P 2006), Berkeley, California, USA, 21-24 May, 2006
, pp. 328-333
-
-
Hancke, G.P.1
-
6
-
-
79952958289
-
Practical Eavesdropping and Skimming Attacks on High-Frequency RFID
-
to appear
-
G. P. Hancke. Practical Eavesdropping and Skimming Attacks on High-Frequency RFID. Journal of Computer Security, 2010. to appear.
-
(2010)
Journal of Computer Security
-
-
Hancke, G.P.1
-
7
-
-
79951493389
-
An ECDSA Processor for RFID Authentication
-
LNCS, Springer
-
M. Hutter, M. Feldhofer, and T. Plos. An ECDSA Processor for RFID Authentication. In Workshop on RFID Security (RFIDsec 2010), Istanbul, Turkey, June 7-9, 2010, LNCS, Springer.
-
Workshop on RFID Security (RFIDsec 2010), Istanbul, Turkey, June 7-9, 2010
-
-
Hutter, M.1
Feldhofer, M.2
Plos, T.3
-
8
-
-
38049074796
-
Power and EM Attacks on Passive 13.56 MHz RFID Devices
-
Cryptographic Hardware and Embedded Systems - CHES 2007, Vienna, Austria, September 10-13, Springer
-
M. Hutter, S. Mangard, and M. Feldhofer. Power and EM Attacks on Passive 13.56 MHz RFID Devices. In Cryptographic Hardware and Embedded Systems - CHES 2007, Vienna, Austria, September 10-13, 2007, LNCS vol. 4727, pp. 320-333. Springer.
-
(2007)
LNCS
, vol.4727
, pp. 320-333
-
-
Hutter, M.1
Mangard, S.2
Feldhofer, M.3
-
9
-
-
77949765115
-
On the Security of RFID Devices Against Implementation Attacks
-
M. Hutter, T. Plos, and M. Feldhofer. On the Security of RFID Devices Against Implementation Attacks. International Journal of Security and Networks 2010, 5(2/3):106-118, 2010.
-
(2010)
International Journal of Security and Networks 2010
, vol.5
, Issue.2-3
, pp. 106-118
-
-
Hutter, M.1
Plos, T.2
Feldhofer, M.3
-
10
-
-
51049096802
-
RFID and its Vulnerability to Faults
-
Cryptographic Hardware and Embedded Systems - CHES 2008, Washington DC, USA, August 10-13, Springer
-
M. Hutter, J.-M. Schmidt, and T. Plos. RFID and its Vulnerability to Faults. In Cryptographic Hardware and Embedded Systems - CHES 2008, Washington DC, USA, August 10-13, 2008, LNCS vol. 5154, pp. 363-379. Springer.
-
(2008)
LNCS
, vol.5154
, pp. 363-379
-
-
Hutter, M.1
Schmidt, J.-M.2
Plos, T.3
-
15
-
-
18744409344
-
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy
-
ACM Press
-
A. Juels, R. L. Rivest, and M. Szydlo. The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In 10th ACM Conference on Computer and Communication Security, Washington, DC, USA, October 27-30, 2003, pages 103-111. ACM Press.
-
10th ACM Conference on Computer and Communication Security, Washington, DC, USA, October 27-30, 2003
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
16
-
-
70349389665
-
Serialized TID numbers - A headache or a blessing for RFID crackers?
-
IEEE Computer Society
-
M. Lehtonen, A. Ruhanen, F. Michahelles, and E. Fleisch. Serialized TID numbers - A headache or a blessing for RFID crackers? In IEEE Conference on RFID (IEEE RFID 2009), Orlando, Florida, USA, April 27-28, 2009, pages 233-240, IEEE Computer Society.
-
IEEE Conference on RFID (IEEE RFID 2009), Orlando, Florida, USA, April 27-28, 2009
, pp. 233-240
-
-
Lehtonen, M.1
Ruhanen, A.2
Michahelles, F.3
Fleisch, E.4
-
17
-
-
43349097152
-
Susceptibility of UHF RFID Tags to Electromagnetic Analysis
-
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, Springer, April
-
T. Plos. Susceptibility of UHF RFID Tags to Electromagnetic Analysis. In Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, volume 4964 of LNCS, pages 288-300. Springer, April 2008.
-
(2008)
LNCS
, vol.4964
, pp. 288-300
-
-
Plos, T.1
-
18
-
-
85094317081
-
A Platform for RFID Security and Privacy Administration
-
M. Rieback, G. Gaydadjiev, B. Crispo, R. Hofman, and A. Tanenbaum. A Platform for RFID Security and Privacy Administration. In 20th USENIX/SAGE Large Installation System Administration Conference, Washington DC, USA, 3-8 December, 2006, pages 89-102.
-
20th USENIX/SAGE Large Installation System Administration Conference, Washington DC, USA, 3-8 December, 2006
, pp. 89-102
-
-
Rieback, M.1
Gaydadjiev, G.2
Crispo, B.3
Hofman, R.4
Tanenbaum, A.5
-
19
-
-
24144467979
-
-
June Available online at
-
Xilinx, Inc. Spartan-3 FPGA Family Data Sheet, June 2008. Available online at http://www.xilinx.com.
-
(2008)
Spartan-3 FPGA Family Data Sheet
-
-
-
20
-
-
85052569451
-
WISP: A Passively Powered UHF RFID Tag with Sensing and Computation
-
chapter CRC Press
-
D. J. Yeager, A. P. Sample, and J. R. Smith. RFID Handbook: Applications, Technology, Security, and Privacy, chapter WISP: A Passively Powered UHF RFID Tag with Sensing and Computation, pages 261-278. CRC Press, 2008.
-
(2008)
RFID Handbook: Applications, Technology, Security, and Privacy
, pp. 261-278
-
-
Yeager, D.J.1
Sample, A.P.2
Smith, J.R.3
|