-
1
-
-
79952449832
-
-
18006-C ISO/IEC. Information technology - radio frequency identification for item management - part 6: parameters for air interface communications at 860 MHz to 960 MHz, 2005
-
18006-C ISO/IEC. Information technology radio frequency identification for item management part 6: parameters for air interface communications at 860 MHz to 960 MHz, 2005 〈 http://www.iso.org 〉.
-
-
-
-
5
-
-
52949116082
-
Provably secure grouping-proofs for RFID Tags. In: Proceeding of the 8th smart card research and advanced applications - CARDIS 2008
-
UK: Springer, Royal Holloway University of London; September
-
Burmester M, de Medeiros B, Motta R. Provably secure grouping-proofs for RFID Tags. In: Proceeding of the 8th smart card research and advanced applications CARDIS 2008. Lecture notes in computer science. UK: Springer, Royal Holloway University of London; September 2008.
-
(2008)
Lecture Notes in Computer Science
-
-
Burmester, M.1
De Medeiros, B.2
Motta, R.3
-
6
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
DOI 10.1109/TDSC.2007.70226
-
H.-Y. Chien SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity IEEE Transactions on Dependable and Secure Computing 4 4 2007 337 340 (Pubitemid 350125898)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
9
-
-
50249120139
-
Enhanced yoking proof protocols for RFID tags and tag groups
-
Okinawa, Japan: IEEE Computer Society; March
-
Cho J-S, Yeo S-S, Hwang S, Rhee S-Y, Kim SK. Enhanced yoking proof protocols for RFID tags and tag groups. In: International conference on advanced information networking and applications workshops AINAW 2008. Okinawa, Japan: IEEE Computer Society; March 2008. p. 15916.
-
(2008)
International Conference on Advanced Information Networking and Applications - Workshops - AINAW 2008
, pp. 1591-6
-
-
Cho, J.-S.1
Yeo, S.-S.2
Hwang, S.3
Rhee, S.-Y.4
Kim, S.K.5
-
10
-
-
49949115266
-
FastRIPP: RFID privacy preserving protocol with forward secrecy and fast resynchronization
-
Taipei, Taiwan, November
-
Conti M, Di Pietro R, Mancini LV, Spognardi A. FastRIPP: RFID privacy preserving protocol with forward secrecy and fast resynchronization. In: 33th annual conference of the IEEE industrial electronics society (IEEE IECON 07), Taipei, Taiwan, November 2007. p. 5257.
-
(2007)
33th Annual Conference of the IEEE Industrial Electronics Society (IEEE IECON 07)
, pp. 52-57
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Spognardi, A.4
-
11
-
-
79952440443
-
-
Generation-2 EPCGlobal, 2008. Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1.2.0: "Gen-2"
-
Generation-2 EPCGlobal, 2008. Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1.2.0: "Gen-2" 〈 http://www. epcglobalinc.org/standards/ 〉.
-
-
-
-
12
-
-
64249134316
-
Vulnerability of an rfid authentication protocol conforming to epc class 1 generation 2 standards
-
D. Han, and D. Kwon Vulnerability of an rfid authentication protocol conforming to epc class 1 generation 2 standards Computer Standards & Interfaces 31 4 2009 648 652
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.4
, pp. 648-652
-
-
Han, D.1
Kwon, D.2
-
13
-
-
70350247648
-
A RFID grouping proof protocol for medication safety of inpatient
-
H.-H. Huang, and C.-Y. Ku A RFID grouping proof protocol for medication safety of inpatient Journal of Medical Systems 33 6 2009 467 474
-
(2009)
Journal of Medical Systems
, vol.33
, Issue.6
, pp. 467-474
-
-
Huang, H.-H.1
Ku, C.-Y.2
-
15
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels RFID security and privacy: a research survey IEEE Journal on Selected Areas in Communications 24 2 2006 381 394 (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
16
-
-
26444603942
-
New applications of T-functions in block ciphers and hash functions
-
Fast Software Encryption: 12th International Workshop, FSE 2005. Revised Selected Papers
-
Klimov A, Shamir A. New applications of t-functions in block ciphers and hash functions. In: Proceedings of 12th international workshop, fast software encryption. Lecture notes in computer science, vol. 3557. ENSTA, Paris, France, Springer: 2005; p. 1831. (Pubitemid 41425153)
-
(2005)
Lecture Notes in Computer Science
, vol.3557
, pp. 18-31
-
-
Klimov, A.1
Shamir, A.2
-
18
-
-
70449433023
-
Select-response grouping proof for RFID tags
-
April
-
Leng X, Lien Y, Mayes K, Markantonakis K, Chiu J-H. Select-response grouping proof for RFID tags. Dong Hoi City, Vietnam: IEEE Computer Society; April 2009. p. 7377.
-
(2009)
Dong Hoi City, Vietnam: IEEE Computer Society
, pp. 73-77
-
-
Leng, X.1
Lien, Y.2
Mayes, K.3
Markantonakis, K.4
Chiu, J.-H.5
-
19
-
-
51849146549
-
Reading order independent grouping proof for RFID tags
-
Taipei, Taiwan: IEEE; June
-
Lien Y, Leng X, Mayes K, Chiu J-H. Reading order independent grouping proof for RFID tags. In: IEEE international conference on intelligence and security informatics, ISI 2008. Taipei, Taiwan: IEEE; June 2008. p. 12836.
-
(2008)
IEEE International Conference on Intelligence and Security Informatics, ISI 2008
, pp. 128-136
-
-
Lien, Y.1
Leng, X.2
Mayes, K.3
Chiu, J.-H.4
-
20
-
-
38049018446
-
Coexistence proof using chain of timestamps for multiple RFID tags
-
Chang KC-C, Wang W, Chen L, Ellis CA, Hsu C-H, Tsoi AC, Wang H, editors Huang Shan, China: Springer-Verlag; June
-
Lin C-C, Lai Y-C, Tygar JD, Yang C-K, Chiang C-L. Coexistence proof using chain of timestamps for multiple RFID tags. In: Chang KC-C, Wang W, Chen L, Ellis CA, Hsu C-H, Tsoi AC, Wang H, editors. International workshop on database management and application over networks DBMAN 2007. Lecture notes in computer science, vol. 4537. Huang Shan, China: Springer-Verlag; June 2007. p. 63443.
-
(2007)
International Workshop on Database Management and Application over Networks - DBMAN 2007. Lecture Notes in Computer Science
, vol.4537
, pp. 634-43
-
-
Lin, C.-C.1
Lai, Y.-C.2
Tygar, J.D.3
Yang, C.-K.4
Chiang, C.-L.5
-
21
-
-
47649132152
-
Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags
-
Istanbul, Turkey: IEEE, IEEE Computer Society Press; July
-
Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A. Solving the simultaneous scanning problem anonymously: clumping proofs for RFID tags. In: IEEE international conference on pervasive services, workshop on security, privacy and trust in pervasive and ubiquitous computingSecPerU 2007. Istanbul, Turkey: IEEE, IEEE Computer Society Press; July 2007. p. 5560.
-
(2007)
IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing-SecPerU 2007
, pp. 55-60
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
22
-
-
84865529995
-
Weaknesses in two recent lightweight RFID authentication Protocols
-
Leuven, Belgium, July 2009a
-
Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Li T, van der Lubbe JC. Weaknesses in two recent lightweight RFID authentication Protocols. In: Workshop on RFID Security RFIDSec'09. Leuven, Belgium, July 2009a.
-
Workshop on RFID Security - RFIDSec'09
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Li, T.4
Van Der Lubbe, J.C.5
-
23
-
-
55749092929
-
Cryptanalysis of a novel authentication protocol conforming to epc-c1g2 standard
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda Cryptanalysis of a novel authentication protocol conforming to epc-c1g2 standard Computer Standards & Interfaces 31 2 2009 372 380
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.2
, pp. 372-380
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
25
-
-
35048904109
-
Enhancing privacy of universal Re-encryption scheme for RFID tags
-
J. Saito, J.-C. Ryou, and K. Sakurai Enhancing privacy of universal Re-encryption scheme for RFID tags L. Jang, M. Guo, G. Gao, N. Jha, Embedded and ubiquitous computing EUC 2004. Lecture notes in computer science vol. 3207 August 2004 Springer-Verlag Aizu-Wakamatsu City, Japan 879 890
-
(2004)
Embedded and Ubiquitous Computing EUC 2004. Lecture Notes in Computer Science
, vol.3207
, pp. 879-890
-
-
Saito, J.1
Ryou, J.-C.2
Sakurai, K.3
-
26
-
-
33744454961
-
Grouping proof for RFID tags
-
DOI 10.1109/AINA.2005.197, 1423764, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
-
Saito J, Sakurai K. Grouping proof for RFID tags. In: Conference on advanced information networking and applications AINA, vol. 2. Taiwan: IEEE; March 2005. p. 6214. (Pubitemid 43804099)
-
(2005)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
, vol.2
, pp. 621-624
-
-
Saito, J.1
Sakurai, K.2
|