-
2
-
-
26444443915
-
A scalable and provably secure hash-based RFID protocol
-
DOI 10.1109/PERCOMW.2005.12, 1392812, Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops
-
G. Avoine, and P. Oechslin A scalable and provably secure hash based RFID protocol International workshop on pervasive computing and communication securityPerSec 2005, Kauai Island, Hawaii, USA March 2005 IEEE, IEEE Computer Society Press 110 114 (Pubitemid 43762830)
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops
, vol.2005
, pp. 110-114
-
-
Avoine, G.1
Oechslin, P.2
-
3
-
-
33745621564
-
Reducing time complexity in RFID systems
-
Preneel B, Tavares S, editors. Kingston, Canada. Springer-Verlag; August
-
Avoine G, Dysli E, Oechslin P. Reducing time complexity in RFID systems. In: Preneel B, Tavares S, editors. Selected areas in cryptographySAC 2005. Lecture notes in computer science, vol. 3897, Kingston, Canada. Springer-Verlag; August 2005. p. 291306.
-
(2005)
Selected Areas in Cryptography-SAC 2005. Lecture Notes in Computer Science
, vol.3897
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
4
-
-
79952438676
-
The Ff-family of protocols for RFID-privacy and authentication
-
Leuven, Belgium, July
-
Blass E-O, Kurmus A, Molva R, Noubir G, Shikfa A. The Ff-family of protocols for RFID-privacy and authentication. In: Workshop on RFID securityRFIDSec'09, Leuven, Belgium, July 2009.
-
(2009)
Workshop on RFID security-RFIDSec'09
-
-
Blass, E.-O.1
Kurmus, A.2
Molva, R.3
Noubir, G.4
Shikfa, A.5
-
5
-
-
33845920117
-
HB: A lightweight authentication protocol secure against some attacks
-
IEEE, IEEE Computer Society Press
-
J. Bringer, H. Chabanne, and D. Emmanuelle HB: a lightweight authentication protocol secure against some attacks IEEE international conference on pervasive services, workshop on security, privacy and trust in pervasive and ubiquitous computingSecPerU 2006, Lyon, France June 2006 IEEE, IEEE Computer Society Press
-
(2006)
IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous ComputingSecPerU 2006, Lyon, France
-
-
Bringer, J.1
Chabanne, H.2
Emmanuelle, D.3
-
6
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti Universally composable security: a new paradigm for cryptographic protocols FOCS '01: Proceedings of the 42nd IEEE symposium on foundations of computer science, Washington, DC, USA 2001 IEEE Computer Society 136 145 (Pubitemid 33068374)
-
(2001)
Annual Symposium on Foundations of Computer Science - Proceedings
, pp. 136-145
-
-
Canetti, R.1
-
8
-
-
34547672707
-
RIPP-FS: An RFID identification, privacy preserving protocol with forward secrecy
-
DOI 10.1109/PERCOMW.2007.100, 4144831, Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
-
M. Conti, R. Di Pietro, L.V. Mancini, and A. Spognardi RIPP-FS: an RFID identification, privacy preserving protocol with forward secrecy Proceedings of the third IEEE international workshop on pervasive computing and communication security 2007 IEEE Press White Plains, New York, USA 229 234 (Pubitemid 47214214)
-
(2007)
Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
, pp. 229-234
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Spognardi, A.4
-
9
-
-
77149128350
-
ERIPP-FS: Enforcing privacy and security in RFID
-
M. Conti, R. Di Pietro, L.V. Mancini, and A. Spognardi eRIPP-FS: enforcing privacy and security in RFID Security and Communication Networks 3 1 2010 58 70
-
(2010)
Security and Communication Networks
, vol.3
, Issue.1
, pp. 58-70
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Spognardi, A.4
-
10
-
-
43149103199
-
RFID security: Tradeoffs between security and efficiency
-
DOI 10.1007/978-3-540-79263-5-20, Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, Proceedings
-
Damgrd I, Pedersen M.Ø. RFID security: tradeoffs between security and efficiency. In: CT-RSA. Lecture notes in computer science, vol. 4964. San Francisco, CA, USA. Springer; 2008. p. 31832. (Pubitemid 351641991)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS
, pp. 318-332
-
-
Damgard, I.1
Pedersen, M.O.2
-
11
-
-
38049010942
-
Information confinement, privacy, and security in RFID systems
-
Dresden, Germany. Springer
-
Di Pietro R, Molva R. Information confinement, privacy, and security in RFID systems. In: 12th European symposium on research in computer security (ESORICS 2007). Lecture notes in computer science, vol. 4734. Dresden, Germany. Springer; 2007. p. 187202.
-
(2007)
12th European Symposium on Research in Computer Security (ESORICS 2007). Lecture Notes in Computer Science
, vol.4734
, pp. 187-202
-
-
Di Pietro, R.1
Molva, R.2
-
12
-
-
33845429016
-
A case against currently used hash functions in RFID protocols
-
On the Move to Meaningful Internet Syst. 2006: OTM 2006 Workshops - OTM Confed. Int. Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerS
-
Feldhofer M, Rechberger C. A case against currently used hash functions in RFID protocols. In: Meersman R, Tari Z, Herrero P, editors. OTM workshops (1). Lecture notes in computer science, vol. 4277. Montpellier, France. Springer; 2006. p. 37281. (Pubitemid 44891826)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS - I
, pp. 372-381
-
-
Feldhofer, M.1
Rechberger, C.2
-
15
-
-
44449155290
-
HB: Increasing the security and efficiency of HB
-
Instanbul, Turkey. Springer
-
Gilbert H, Robshaw MJB, Seurin Y. HB : increasing the security and efficiency of HB. In: Advances in cryptologyEUROCRYPT 2008. Lecture notes in computer science, vol. 4965, Instanbul, Turkey. Springer; 2008. p. 36178.
-
(2008)
Advances in Cryptology-EUROCRYPT 2008. Lecture Notes in Computer Science
, vol.4965
, pp. 361-78
-
-
Gilbert, H.1
Mjb, R.2
Seurin, Y.3
-
17
-
-
70349284581
-
Secure Human Identification Protocols
-
Advances in Cryptology - ASIACRYPT 2001
-
Hopper NJ, Blum M. Secure human identification protocols. In: Proceedings of the seventh international conference on the theory and application of cryptology and information security (ASIACRYPT '01). Lecture notes in computer science, vol. 2248, Gold Coast, Australia. Springer-Verlag; 2001. p. 5266. (Pubitemid 33371178)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
18
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels RFID security and privacy: a research survey IEEE Journal on Selected Areas in Communications 24 2 2006 381 394 (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
19
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
Santa Barbara, California, USA. Springer-Verlag
-
Juels A, Weis S. Authenticating pervasive devices with human protocols. In: Advances in cryptologyCRYPTO'05. Lecture notes in computer science, vol. 3126, Santa Barbara, California, USA. Springer-Verlag; 2005. p. 293308.
-
(2005)
Advances in cryptology-CRYPTO'05. Lecture Notes in Computer Science
, vol.3126
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
20
-
-
34547687590
-
Defining strong privacy for RFID
-
DOI 10.1109/PERCOMW.2007.37, 4144854, Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
-
A. Juels, and S.A. Weis Defining strong privacy for RFID PERCOMW '07: proceedings of the fifth IEEE international conference on pervasive computing and communications workshops, Washington, DC, USA 2007 IEEE Computer Society 342 347 (Pubitemid 47214235)
-
(2007)
Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
21
-
-
26444603942
-
New applications of T-functions in block ciphers and hash functions
-
Fast Software Encryption: 12th International Workshop, FSE 2005. Revised Selected Papers
-
Klimov A, Shamir A. New applications of t-functions in block ciphers and hash functions. In: Gilbert H, Handschuh H, editors. FSE. Lecture notes in computer science, vol. 3557. Paris, France. Springer; 2005. p. 1831. (Pubitemid 41425153)
-
(2005)
Lecture Notes in Computer Science
, vol.3557
, pp. 18-31
-
-
Klimov, A.1
Shamir, A.2
-
24
-
-
60549098472
-
RFID infrastructure design: A case study of two Australian RFID projects
-
J.P.T. Mo, Q.Z. Sheng, X. Li, and S. Zeadally RFID infrastructure design: a case study of two Australian RFID projects IEEE Internet Computing 13 1 2009 14 21
-
(2009)
IEEE Internet Computing
, vol.13
, Issue.1
, pp. 14-21
-
-
Mo, J.P.T.1
Sheng, Q.Z.2
Li, X.3
Zeadally, S.4
-
25
-
-
14844294769
-
Privacy and security in library RFID issues, practices, and architectures
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
Molnar D, Wagner D. Privacy and security in library RFID: issues, practices, and architectures. In: CCS '04: proceedings of the 11th ACM conference on computer and communications security, New York, NY, USA. ACM Press; 2004. p. 2109. (Pubitemid 40338202)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
26
-
-
34547426005
-
Cryptanalysis of t-function-based hash functions
-
Rhee MS, Lee B, editors. Busan, Korea. Springer
-
Muller F, Peyrin T. Cryptanalysis of t-function-based hash functions. In: Rhee MS, Lee B, editors. ICISC. Lecture notes in computer science, vol. 4296. Busan, Korea. Springer; 2006. p. 26785.
-
(2006)
ICISC. Lecture Notes in Computer Science
, vol.4296
, pp. 267-85
-
-
Muller, F.1
Peyrin, T.2
-
27
-
-
41549161615
-
Privacy of recent RFID authentication protocols
-
DOI 10.1007/978-3-540-79104-1-19, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings
-
Ouafi K, Phan RC-W. Privacy of recent RFID authentication protocols. In: Information security practice and experience, fourth international conference (ISPEC 2008). Lecture notes in computer science, vol. 4991. New York City, New York, USA. Springer; 2008. p. 26377. (Pubitemid 351465331)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS
, pp. 263-277
-
-
Ouafi, K.1
Phan, R.C.-W.2
-
28
-
-
34547638972
-
HB and related lightweight authentication protocols for secure RFID tag/reader authentication
-
Basel, Switzerland, June
-
Piramuthu S. HB and related lightweight authentication protocols for secure RFID tag/reader authentication. In: Collaborative electronic commerce technology and researchCollECTeR 2006, Basel, Switzerland, June 2006.
-
(2006)
Collaborative Electronic Commerce Technology and Research-CollECTeR 2006
-
-
Piramuthu, S.1
-
29
-
-
33745866296
-
A compact FPGA implementation of the hash function whirlpool
-
Fourteenth ACM/SIGDA International Symposium on Field Programmable Gate Arrays - FPGA 2006
-
N. Pramstaller, C. Rechberger, and V. Rijmen A compact fpga implementation of the hash function whirlpool FPGA '06: Proceedings of the 2006 ACM/SIGDA 14th international symposium on field programmable gate arrays, New York, NY, USA 2006 ACM Press 159 166 (Pubitemid 44032249)
-
(2006)
ACM/SIGDA International Symposium on Field Programmable Gate Arrays - FPGA
, pp. 159-166
-
-
Pramstaller, N.1
Rechberger, C.2
Rijmen, V.3
-
30
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
-
Rhee K, Kwak J, Kim S, Won D. Challenge-response based RFID authentication protocol for distributed database environment. In: Hutter D, Ullmann M, editors. International conference on security in pervasive computingSPC 2005. Lecture notes in computer science, vol. 3450, Boppard, Germany. Springer-Verlag; 2005. p. 7084. (Pubitemid 41274193)
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
31
-
-
50249161524
-
SQUASH-a new MAC with provable security properties for highly constrained devices such as RFIDs tags
-
Lausanne, Switzerland. Springer
-
Shamir A. SQUASHa new MAC with provable security properties for highly constrained devices such as RFIDs tags. In: The 15th international workshop on fast software encryption (FSE). Lecture notes in computer science, vol. 5086. Lausanne, Switzerland. Springer; 2008. p. 14457.
-
(2008)
The 15th International Workshop on Fast Software Encryption (FSE). Lecture Notes in Computer Science
, vol.5086
, pp. 144-157
-
-
Shamir, A.1
-
32
-
-
52449127948
-
Enabling next-generation RFID applications: Solutions and challenges
-
Q.Z. Sheng, X. Li, and S. Zeadally Enabling next-generation RFID applications: solutions and challenges Computer 41 9 2008 21 28
-
(2008)
Computer
, vol.41
, Issue.9
, pp. 21-28
-
-
Sheng, Q.Z.1
Li, X.2
Zeadally, S.3
-
33
-
-
33750290259
-
YA-TRAP: Yet another trivial RFID authentication protocol
-
DOI 10.1109/PERCOMW.2006.152, 1599066, Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
-
G. Tsudik Ya-trap: yet another trivial RFID authentication protocol PERCOMW '06: Proceedings of the 4th annual IEEE international conference on pervasive computing and communications workshops, Washington, DC, USA 2006 IEEE Computer Society 640 643 (Pubitemid 44612661)
-
(2006)
Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
, vol.2006
, pp. 640-643
-
-
Tsudik, G.1
-
34
-
-
44649113207
-
Untraceability of RFID protocols. In: Information security theory and practices
-
Sevilla, Spain. Springer
-
van Deursen T, Mauw S, Radomirović S. Untraceability of RFID protocols. In: Information security theory and practices. Smart devices, convergence and next generation networks. Lecture notes in computer science, vol. 5019, Sevilla, Spain. Springer; 2008. p. 115.
-
(2008)
Smart Devices, Convergence and Next Generation Networks. Lecture Notes in Computer Science
, vol.5019
, pp. 1-15
-
-
Van Deursen, T.1
Mauw, S.2
Radomirović, S.3
|