-
1
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
-
February
-
H. Chien and C. Chen, Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, 29(2):254-259, February 2007.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.1
Chen, C.2
-
3
-
-
20544465052
-
Anonymous secure routing in mobile ad-hoc networks
-
Bo.Z., Wan.Z.G., Kankanhalli.M.S., Feng.B., Deng.R.H.: Anonymous secure routing in mobile ad-hoc networks, Local Computer Networks, 2004. 29th Annual IEEE International Conference on 16-18 Nov. (2004) 102-108
-
Local Computer Networks, 2004. 29th Annual IEEE International Conference on 16-18 Nov. (2004)
, pp. 102-108
-
-
Bo, Z.1
Wan, Z.G.2
Kankanhalli, M.S.3
Feng, B.4
Deng, R.H.5
-
4
-
-
78651589023
-
An novel anonymous authenticated and key exchange protocol
-
December
-
Hui Cui, Tianjie Cao. An novel anonymous authenticated and key exchange protocol, Journal of networks, Vol. 4, No. 10, December 2009, pp. 985-992
-
(2009)
Journal of Networks
, vol.4
, Issue.10
, pp. 985-992
-
-
Cui, H.1
Cao, T.2
-
5
-
-
58549121204
-
A new anonymous password-based authenticated key exchange protocol
-
D.R.Chowdhury, V.Rijmen, and A.Das (Eds.) INDOCRYPT 2008, Springer-Verlag Berlin Heidelberg 2008
-
Jing Yang, Zhenfeng Zhang. A new anonymous password-based authenticated key exchange protocol. D.R.Chowdhury, V.Rijmen, and A.Das (Eds.): INDOCRYPT 2008, LNCS 5365, pp.200-212, 2008. Springer-Verlag Berlin Heidelberg 2008
-
(2008)
LNCS
, vol.5365
, pp. 200-212
-
-
Yang, J.1
Zhang, Z.2
-
6
-
-
33749681217
-
Efficient password-based authentication and key exchange scheme preserving user privacy
-
X.Cheng, W.Li, and T.Znati (Eds.): WASA 2006, Springer-Verlag Berlin Heidelberg 2006
-
Zhenchuan Chai, Zhenfu Cao, and Rongxing Lu. Efficient password-based authentication and key exchange scheme preserving user privacy. X.Cheng, W.Li, and T.Znati (Eds.): WASA 2006, LNCS 4138, pp.467-477, 2006. Springer-Verlag Berlin Heidelberg 2006
-
(2006)
LNCS
, vol.4138
, pp. 467-477
-
-
Chai, Z.1
Cao, Z.2
Lu, R.3
-
7
-
-
78651545720
-
Efficient ID-based secure encryption scheme for anonymous receivers
-
December
-
Xiaohui Wang, Ai-ling wang, Ling Yan Wang. Efficient ID-based secure encryption scheme for anonymous receivers, Journal of networks, Vol. 4, No. 10, December 2009, pp. 641-648
-
(2009)
Journal of Networks
, vol.4
, Issue.10
, pp. 641-648
-
-
Wang, X.1
Wang, A.-L.2
Wang, L.Y.3
-
8
-
-
84977783611
-
Strong and robust RFID authentication enabling perfect ownership transfer
-
P. Ning, S. Qing, and N. Li, editors, Conference on Information and Communications Security - ICICS '06, Raleigh, North Carolina, USA, December Springer-Verlag
-
C. Lim and T. Kwon. Strong and robust RFID authentication enabling perfect ownership transfer. In P. Ning, S. Qing, and N. Li, editors, Conference on Information and Communications Security - ICICS '06, volume 4307 of Lecture Notes in Computer Science, pages 1-20, Raleigh, North Carolina, USA, December 2006. Springer-Verlag.
-
(2006)
Lecture Notes in Computer Science
, vol.4307
, pp. 1-20
-
-
Lim, C.1
Kwon, T.2
-
10
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
T. Dimitriou, "A lightweight RFID protocol to protect against traceability and cloning attacks," In IEEE SecureComm, pp.59-66, 2005.
-
(2005)
IEEE SecureComm
, pp. 59-66
-
-
Dimitriou, T.1
-
11
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, LNCS 3156, Springer-Verlag, pp.357-370, 2004.
-
(2004)
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
12
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
The Fourth international Conference on Security in Communication Networks - SCN 2004, Springer-Verlag
-
A. Juels, \Minimalist cryptography for low-cost RFID tags," The Fourth international Conference on Security in Communication Networks - SCN 2004, LNCS 3352, Springer-Verlag, pp.149-164, 2004.
-
(2004)
LNCS
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
13
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
ACM Press
-
A. Juels, R.L. Rivest, and M. Szydlo, \The blocker tag: Selective blocking of RFID tags for consumer privacy," 8th ACM Conference on Computer and Communications Security, ACM Press, pp.103-111, 2003.
-
(2003)
8th ACM Conference on Computer and Communications Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
14
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
A.D. Henrici, P. MÄuller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, In the Proceedings of PerSec'04 at IEEE PerCom, 2004, pp. 149-153.
-
The Proceedings of PerSec'04 at IEEE PerCom, 2004
, pp. 149-153
-
-
Henrici, A.D.1
MÄuller, P.2
-
15
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, Conference on Computer and Communications Security - CCS'04, 2004, pp. 210-219.
-
Conference on Computer and Communications Security - CCS'04, 2004
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
16
-
-
33751513718
-
Enhancing security of EPCglobal GEN-2 RFID tag against traceability and cloning
-
D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal GEN-2 RFID tag against traceability and cloning, The 2006 Symposium on Cryptography and Information Security, 2006.
-
The 2006 Symposium on Cryptography and Information Security, 2006
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
|