-
1
-
-
70249087379
-
Rfid DOT: RFID delegation and ownership transfer made simple
-
Istanbul, Turkey, September,ACM Press
-
T. Dimitriou, rfidDOT: RFID delegation and ownership transfer made simple, in: 4th International Conference on Security and Privacy in Communication Networks - SecureComm, Istanbul, Turkey, September 2008, ACM Press, pp. 1-8.
-
(2008)
4th International Conference on Security and Privacy in Communication Networks-SecureComm
, pp. 1-8
-
-
Dimitriou, T.1
-
2
-
-
63149151663
-
A simple delegation scheme for RFID systems (SiDeS)
-
Grapevine, TX, USA, March, IEEE
-
S. Fouladgar and H. Afifi, A simple delegation scheme for RFID systems (SiDeS), in: IEEE RFID, Grapevine, TX, USA, March 2007, IEEE.
-
(2007)
IEEE RFID
-
-
Fouladgar, S.1
Afifi, H.2
-
3
-
-
59249097693
-
A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
-
S. Fouladgar and H. Afifi, A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags, Journal of Communications 2(6) (2007), 6-13.
-
(2007)
Journal of Communications
, vol.2
, Issue.6
, pp. 6-13
-
-
Fouladgar, S.1
Afifi, H.2
-
4
-
-
70349117791
-
An efficient delegation and transfer of ownership protocol for RFID tags
-
Vienna, Austria, September, EURASIP
-
S. Fouladgar and H. Afifi, An efficient delegation and transfer of ownership protocol for RFID tags, in: 1st International EURASIP Workshop on RFID Technology, Vienna, Austria, September 2007, EURASIP.
-
(2007)
1st International EURASIP Workshop on RFID Technology
-
-
Fouladgar, S.1
Afifi, H.2
-
5
-
-
35248846439
-
POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism
-
DOI 10.1145/1244002.1244069, Proceedings of the 2007 ACM Symposium on Applied Computing
-
K.H.S.S. Koralalage, M.R. Selim, J. Miura, Y. Goto and J. Cheng, POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism, in: ACM Symposium on Applied Computing - SAC, Seoul, Korea, March 2007, ACM Press, pp. 270-275. (Pubitemid 47568298)
-
(2007)
Proceedings of the ACM Symposium on Applied Computing
, pp. 270-275
-
-
Koralalage, K.H.S.S.1
Reza, S.M.2
Miura, J.3
Goto, Y.4
Cheng, J.5
-
6
-
-
84977783611
-
Strong and robust RFID authentication enabling perfect ownership transfer
-
P. Ning, S. Qing and N. Li, eds, Raleigh, NC, USA, December, Lecture Notes in Computer Science, Springer-Verlag
-
C.H. Lim and T. Kwon, Strong and robust RFID authentication enabling perfect ownership transfer, in: 8th International Conference on Information and Communications Security - ICICS, P. Ning, S. Qing and N. Li, eds, Raleigh, NC, USA, December 2006, Lecture Notes in Computer Science, Vol. 4307, Springer-Verlag, pp. 1-20.
-
(2006)
8th International Conference on Information and Communications Security-ICICS
, vol.4307
, pp. 1-20
-
-
Lim, C.H.1
Kwon, T.2
-
7
-
-
33745597876
-
A scalable, delegatable pseudonym. Protocol enabling ownership transfer of RFID tags (Extended Abstract)
-
DOI 10.1007/11693383-19, Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Revised Selected Papers
-
D. Molnar, A. Soppera and D. Wagner, A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags, in: 12th International Workshop on Selected Areas in Cryptography - SAC, B. Preneel and S. Tavares, eds, Kingston, ON, Canada, August 2005, Lecture Notes in Computer Science, Vol. 3897, Springer-Verlag, pp. 276-290. (Pubitemid 43986800)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3897
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
8
-
-
34548180384
-
A scalable, delegatable, pseudonym protocol enabling ownership transfer of RFID tags
-
Graz, Austria, July, IAIK TU Graz
-
D. Molnar, A. Soppera and D. Wagner, A scalable, delegatable, pseudonym protocol enabling ownership transfer of RFID tags, in: Workshop on RFID and Light-Weight Crypto, Graz, Austria, July 2005, IAIK TU Graz.
-
(2005)
Workshop on RFID and Light-Weight Crypto
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
9
-
-
57049184162
-
RFID privacy models revisited
-
S. Jajodia and J. Lopez, eds, Malaga, Spain, October, Lecture Notes in Computer Science, Springer-Verlag
-
C.Y. Ng, W. Susilo, Y. Mu and R. Safavi-Naini, RFID privacy models revisited, in: 13th European Symposium on Research in Computer Security - ESORICS, S. Jajodia and J. Lopez, eds, Malaga, Spain, October 2008, Lecture Notes in Computer Science, Vol. 5283, Springer-Verlag, pp. 251-266.
-
(2008)
13th European Symposium on Research in Computer Security-ESORICS
, vol.5283
, pp. 251-266
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
10
-
-
70350383766
-
New privacy results on synchronized RFID authentication protocols against tag tracing
-
M. Backes and P. Ning, eds, Saint-Malo, France, September, Lecture Notes in Computer Science, Springer-Verlag
-
C.Y. Ng, W. Susilo, Y. Mu and R. Safavi-Naini, New privacy results on synchronized RFID authentication protocols against tag tracing, in: 14th European Symposium on Research in Computer Security - ESORICS, M. Backes and P. Ning, eds, Saint-Malo, France, September 2009, Lecture Notes in Computer Science, Vol. 5789, Springer-Verlag, pp. 321-336.
-
(2009)
14th European Symposium on Research in Computer Security-ESORICS
, vol.5789
, pp. 321-336
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
11
-
-
38349066494
-
An efficient and secure RFID security method with ownership transfer
-
Y. Wang, Y. Ming Cheung and H. Liu, eds, Guangzhou, China, November, Lecture Notes in Computer Science, Springer-Verlag
-
K. Osaka, T. Takagi, K. Yamazaki and O. Takahashi, An efficient and secure RFID security method with ownership transfer, Y. Wang, Y. Ming Cheung and H. Liu, eds, in: Computational Intelligence and Security - CIS, Guangzhou, China, November 2006, Lecture Notes in Computer Science, Vol. 4456, Springer-Verlag, pp. 778-787.
-
(2006)
Computational Intelligence and Security-CIS
, vol.4456
, pp. 778-787
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
12
-
-
33744928896
-
Reassignment scheme of an RFID tag's key for owner transfer
-
DOI 10.1007/11596042-132, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings
-
J. Saito, K. Imamoto and K. Sakurai, Reassignment scheme of an RFID tag's key for owner transfer, in: Embedded and Ubiquitous Computing Workshops - EUC, T. Enokido, L. Yan, B. Xiao, D. Kim, Y.-S. Dai and L.T. Yang, eds, Nagasaki, Japan, December 2005, Lecture Notes in Computer Science, Vol. 3823, Springer-Verlag, pp. 1303-1312. (Pubitemid 43848806)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3823
, pp. 1303-1312
-
-
Saito, J.1
Imamoto, K.2
Sakurai, K.3
-
13
-
-
78149486773
-
RFID tag ownership transfer
-
Budapest, Hungary, July, IAIK TU Graz
-
B. Song, RFID tag ownership transfer, in: 4th Workshop on RFID Security - RFIDSec, Budapest, Hungary, July 2008, IAIK TU Graz.
-
(2008)
4th Workshop on RFID Security-RFIDSec
-
-
Song, B.1
-
14
-
-
78149483237
-
Secure by default: The RFID acceptor tag (RAT)
-
Graz, Austria, July, IAIK TU Graz
-
A. Soppera and T. Burbridge. Secure by default: The RFID acceptor tag (RAT), in: 2nd Workshop on RFID Security - RFIDSec, Graz, Austria, July 2006, IAIK TU Graz.
-
(2006)
2nd Workshop on RFID Security-RFIDSec
-
-
Soppera, A.1
Burbridge, T.2
-
15
-
-
70350399643
-
Secure ownership and ownership transfer in RFID systems
-
Saint-Malo, France, September, Lecture Notes in Computer Science, Springer-Verlag
-
T. van Deursen, S. Mauw, S. Radomirović and P. Vullers, Secure ownership and ownership transfer in RFID systems, in: 14th European Symposium on Research in Computer Security - ESORICS, Saint- Malo, France, September 2009, Lecture Notes in Computer Science, Vol. 5789, Springer-Verlag, pp. 637-654.
-
(2009)
14th European Symposium on Research in Computer Security-ESORICS
, vol.5789
, pp. 637-654
-
-
Van Deursen, T.1
Mauw, S.2
Radomirović, S.3
Vullers, P.4
-
16
-
-
38149038702
-
On privacy models for RFID
-
K. Kurosawa, ed., Kuching, Malaysia, December, Lecture Notes in Computer Science, Springer-Verlag
-
S. Vaudenay, On privacy models for RFID, in: 13th International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT, K. Kurosawa, ed., Kuching, Malaysia, December 2007, Lecture Notes in Computer Science, Vol. 4833, Springer-Verlag, pp. 68- 87.
-
(2007)
13th International Conference on the Theory and Application of Cryptology and Information Security-ASIACRYPT
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
|