-
3
-
-
79952171484
-
-
2009, http://www.avoine.net/rfid/
-
Gildas Avoine. 2009, http://www.avoine.net/rfid/
-
Gildas Avoine
-
-
-
7
-
-
33144487342
-
An active attack against H B+ a provably secure lightweight authentication protocol
-
2005/237
-
Gilbert H., Robshaw M., Sibert H., An active attack against H B+ a provably secure lightweight authentication protocol Cryptology ePrint Archive, Report 2005 2005/237
-
(2005)
Cryptology EPrint Archive, Report
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
8
-
-
33845920117
-
B + +: A lightweight authentication protocol secure against some attacks
-
Bringer J., Chabanne H., Dottax E., B + +: a lightweight authentication protocol secure against some attacks 2006 Proceedings of the IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU '06) 2006 28 33
-
Proceedings of the IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU '06) 2006
, vol.2006
, pp. 28-33
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
17
-
-
34547672707
-
RIPP-FS: An RFID identification, privacy preserving protocol with forward secrecy
-
Conti M., Di Pietro R., Mancini L. V., Spognardi A., RIPP-FS: an RFID identification, privacy preserving protocol with forward secrecy Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW '07) 2007 229 234
-
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW '07) 2007
, pp. 229-234
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Spognardi, A.4
-
18
-
-
77149128350
-
ERIPP-FS: Enforcing privacy and security in RFID
-
Conti M., di Pietro R., Mancini L. V., Spognardi A., eRIPP-FS: enforcing privacy and security in RFID Security and Communication Networks 2010 3 1 58 70
-
(2010)
Security and Communication Networks
, vol.3
, Issue.1
, pp. 58-70
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Spognardi, A.4
-
24
-
-
0018545449
-
How to share a secret
-
Shamir A., How to share a secret Communications of the ACM 1979 22 11 612 613
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
27
-
-
84891359925
-
-
http://www.epcglobalinc.org/home
-
EPCGlobal. http://www.epcglobalinc.org/home
-
EPCGlobal
-
-
-
30
-
-
79952141175
-
-
2009, http://www.nxp.com
-
NXP. 2009, http://www.nxp.com
-
NXP
-
-
-
33
-
-
79952149480
-
Squash: A new one-way hash function with provable security properties for highly constrained devices such as RFID tags
-
Shamir A., Squash: A new one-way hash function with provable security properties for highly constrained devices such as RFID tags Proceedings of the Conference on RFID Security 2007 136
-
Proceedings of the Conference on RFID Security 2007
, pp. 136
-
-
Shamir, A.1
-
35
-
-
34248658262
-
Tag-splitting: Adaptive collision arbitration protocols for RFID tag identification
-
DOI 10.1109/TPDS.2007.1098
-
Myung J., Lee W., Srivastava J., Shih T. K., Tag-splitting: Adaptive collision arbitration protocols for RFID tag identification IEEE Transactions on Parallel and Distributed Systems 2007 18 6 763 775 (Pubitemid 46767740)
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.6
, pp. 763-775
-
-
Myung, J.1
Lee, W.2
Srivastava, J.3
Shih, T.K.4
|