-
1
-
-
33144457479
-
RFID Security and Privacy: A Research Survey
-
A. Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
2
-
-
78651569494
-
Impact of RFID Technology on Tracking of Export Goods in Kenya
-
J. K. Siror, L. Guangun, P. Kaifang, S. Huanye, and W. Dong, "Impact of RFID Technology on Tracking of Export Goods in Kenya", JCIT: Journal of Convergence Information Technology, vol. 5, no. 9, pp. 190-199, 2010.
-
(2010)
JCIT: Journal of Convergence Information Technology
, vol.5
, Issue.9
, pp. 190-199
-
-
Siror, J.K.1
Guangun, L.2
Kaifang, P.3
Huanye, S.4
Dong, W.5
-
3
-
-
78651572562
-
Use of RFID for Intelligent Preshipment Inspection
-
J. K. Siror, L. Guanqun, K. Pang, S. Huanye, and W. Dong, "Use of RFID for Intelligent Preshipment Inspection", JDCTA: International Journal of Digital Content Technology and its Applications, vol. 4, no. 8, pp. 242-251, 2010.
-
(2010)
JDCTA: International Journal of Digital Content Technology and its Applications
, vol.4
, Issue.8
, pp. 242-251
-
-
Siror, J.K.1
Guanqun, L.2
Pang, K.3
Huanye, S.4
Dong, W.5
-
7
-
-
44649113207
-
Untraceability of RFID Protocols
-
T. van Deursen, S. Mauw, and S. Radomirović, "Untraceability of RFID Protocols", In Workshop on Information Security Theory and Practice, Lecture Notes in Computer Science, vol. 5019, pp. 1-15, 2008.
-
(2008)
Workshop on Information Security Theory and Practice, Lecture Notes in Computer Science
, vol.5019
, pp. 1-15
-
-
van Deursen, T.1
Mauw, S.2
Radomirović, S.3
-
8
-
-
70350399643
-
Secure Ownership and Ownership Transfer in RFID systems
-
T. van Deursen, S. Mauw, S. Radomirović, and P. Vullers, "Secure Ownership and Ownership Transfer in RFID systems", In Proceedings 14th European Symposium On Research In Computer Security, Lecture Notes in Computer Science, vol. 5789, pp. 637-654, 2009.
-
(2009)
Proceedings 14th European Symposium On Research In Computer Security, Lecture Notes in Computer Science
, vol.5789
, pp. 637-654
-
-
van Deursen, T.1
Mauw, S.2
Radomirović, S.3
Vullers, P.4
-
9
-
-
33744957484
-
Adversarial Model for Radio Frequency Identification
-
G. Avoine, "Adversarial Model for Radio Frequency Identification", Cryptology ePrint Archive, Report 2005/049, http://eprint. iacr. org/, 2005.
-
(2005)
Cryptology ePrint Archive, Report 2005/049
-
-
Avoine, G.1
-
11
-
-
57049184162
-
RFID Privacy Models Revisited
-
C. Y. Ng, W. Susilo, Y. Mu, and R. Safavi-Naini, "RFID Privacy Models Revisited", In Proceedings of the 13th European Symposium on Research in Computer Security, pp. 251-266, 2008.
-
(2008)
Proceedings of the 13th European Symposium on Research in Computer Security
, pp. 251-266
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
12
-
-
72449181354
-
Defining strong privacy for RFID
-
A. Juels and S. A. Weis, "Defining strong privacy for RFID", ACM Transactions on Information and System Security, vol. 13, no. 1, pp. 1-23, 2009.
-
(2009)
ACM Transactions on Information and System Security
, vol.13
, Issue.1
, pp. 1-23
-
-
Juels, A.1
Weis, S.A.2
-
14
-
-
54049143316
-
Elliptic-Curve-Based Security Processor for RFID
-
Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic-Curve-Based Security Processor for RFID", IEEE Transactions on Computers, vol. 57, pp. 1514-1527, 2008.
-
(2008)
IEEE Transactions on Computers
, vol.57
, pp. 1514-1527
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
16
-
-
49049105964
-
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol
-
Y. K. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol", In IEEE International Conference on RFID, pp. 97-104, 2008.
-
(2008)
IEEE International Conference on RFID
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
17
-
-
58449108568
-
Cryptanalysis of EC-RAC, A RFID Identification Protocol
-
J. Bringer, H. Chabanne, and T. Icart, "Cryptanalysis of EC-RAC, A RFID Identification Protocol", In 7th International Conference on Cryptology And Network Security, Lecture Notes in Computer Science, vol. 5339, pp. 149-161, 2008.
-
(2008)
7th International Conference on Cryptology And Network Security, Lecture Notes in Computer Science
, vol.5339
, pp. 149-161
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
18
-
-
70349268101
-
Untraceable RFID Authentication Protocols: Revision of EC-RAC
-
Y. K. Lee, L. Batina, and I. Verbauwhede, "Untraceable RFID Authentication Protocols: Revision of EC-RAC", In IEEE International Conference on RFID, pp. 178-185, 2009.
-
(2009)
IEEE International Conference on RFID
, pp. 178-185
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
19
-
-
77952353685
-
Untraceable RFID Protocols Are Not Trivially Composable: Attacks on The Revision of EC-RAC
-
University of Luxembourg
-
T. van Deursen and S. Radomirović, "Untraceable RFID Protocols Are Not Trivially Composable: Attacks on The Revision of EC-RAC", University of Luxembourg, Technical Report, 2009.
-
(2009)
Technical Report
-
-
van Deursen, T.1
Radomirović, S.2
-
20
-
-
80052477253
-
Short Paper: Privacy preserving ECC-based grouping proofs for RFID
-
In
-
L. Batina, Y. K. Lee, S. Seys, D. Singelée and I. Verbauwhede, "Short Paper: Privacy preserving ECC-based grouping proofs for RFID", In Information Security-13th International Conference, Lecture Notes in Computer Science, vol. 6531, 2010.
-
(2010)
Information Security-13th International Conference, Lecture Notes in Computer Science
, vol.6531
-
-
Batina, L.1
Lee, Y.K.2
Seys, S.3
Singelée, D.4
Verbauwhede, I.5
-
21
-
-
34547921719
-
-
USA
-
F. Thornton, B. Haines, A. M. Das, H. Bhargava, and A. Campbell, RFID Security, Syngress, USA, 2006.
-
(2006)
RFID Security, Syngress
-
-
Thornton, F.1
Haines, B.2
Das, A.M.3
Bhargava, H.4
Campbell, A.5
-
22
-
-
74049109627
-
An Efficient Forward Private RFID Protocol
-
C. Berbain, O. Billet, J. Etrog, and H. Gilbert, "An Efficient Forward Private RFID Protocol", In Proceedings of the 16th ACM conference on Computer and communications security, pp. 43-53, 2009.
-
(2009)
Proceedings of the 16th ACM conference on Computer and communications security
, pp. 43-53
-
-
Berbain, C.1
Billet, O.2
Etrog, J.3
Gilbert, H.4
-
23
-
-
0020720357
-
On the Security of Public-key Protocols
-
D. Dolev and A. Yao, "On the Security of Public-key Protocols", IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
26
-
-
79953728671
-
A New Framework for RFID Privacy
-
IACR
-
R. H. Deng, Y. Li, A. C. Yao, M. Yung, and Y. Zhao, "A New Framework for RFID Privacy", Cryptology ePrint Archive, Report 2010/059, IACR, 2010.
-
(2010)
Cryptology ePrint Archive, Report 2010/059
-
-
Deng, R.H.1
Li, Y.2
Yao, A.C.3
Yung, M.4
Zhao, Y.5
-
27
-
-
84885893141
-
Wide-Weak Privacy-Preserving RFID Authentication Protocols
-
In, Springer-Verlag
-
Y. K. Lee, L. Batina, D. Singelée, and I. Verbauwhede, "Wide-Weak Privacy-Preserving RFID Authentication Protocols", In International Conference on Mobile Lightweight Wireless Systems, Springer-Verlag, 2010.
-
(2010)
International Conference on Mobile Lightweight Wireless Systems
-
-
Lee, Y.K.1
Batina, L.2
Singelée, D.3
Verbauwhede, I.4
-
28
-
-
79952396973
-
Security Improvement in Authentication Protocol for Gen-2 Based RFID System
-
L. Wang, X. Yi, C. Lv, Y. Guo, "Security Improvement in Authentication Protocol for Gen-2 Based RFID System", JCIT: Journal of Convergence Information Technology, vol. 6, no. 1, pp. 157-169, 2011
-
(2011)
JCIT: Journal of Convergence Information Technology
, vol.6
, Issue.1
, pp. 157-169
-
-
Wang, L.1
Yi, X.2
Lv, C.3
Guo, Y.4
|