-
1
-
-
79957508148
-
-
Technical report, BRIDGE Project, June
-
M. Aigner, T. Burbridge, J. J. Cantero, A. Ilic, J. Al-Kassab, O. Kasten, and A. Plaza. Security technology roadmap. Technical report, BRIDGE Project, June 2009.
-
(2009)
Security Technology Roadmap
-
-
Aigner, M.1
Burbridge, T.2
Cantero, J.J.3
Ilic, A.4
Al-Kassab, J.5
Kasten, O.6
Plaza, A.7
-
3
-
-
33750018373
-
Shoehorning security into the EPC tag standard
-
R. D. Prisco and M. Yung, editors, Security and Cryptography for Networks, 5th International Conference, SCN 2006, Springer, September
-
D. V. Bailey and A. Juels. Shoehorning security into the EPC tag standard. In R. D. Prisco and M. Yung, editors, Security and Cryptography for Networks, 5th International Conference, SCN 2006, LNCS, pages 303-320. Springer, September 2006.
-
(2006)
LNCS
, pp. 303-320
-
-
Bailey, D.V.1
Juels, A.2
-
6
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
J.-J. Q. Marc Joye, editor, Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop, Springer, July
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In J.-J. Q. Marc Joye, editor, Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop, LNCS, volume 3156, pages 357-370. Springer, July 2004.
-
(2004)
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
7
-
-
38149027548
-
When stream cipher analysis meets public-key cryptography
-
E. Biham and A. M.Youssef, editors, Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Springer, September
-
M. Finiasz and S. Vaudenay. When stream cipher analysis meets public-key cryptography. In E. Biham and A. M.Youssef, editors, Selected Areas in Cryptography - 13th International Workshop, SAC 2006, LNCS, volume 4356, pages 266-284. Springer, September 2007.
-
(2007)
LNCS
, vol.4356
, pp. 266-284
-
-
Finiasz, M.1
Vaudenay, S.2
-
9
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
March
-
G. Gaubatz, J.-P. Kaps, E. Ozturk, and B. Sunar. State of the art in ultra-low power public key cryptography for wireless sensor networks. In Third IEEE International Conference on Pervasive Computing and Communications Workshops, pages 146-150, March 2005.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.-P.2
Ozturk, E.3
Sunar, B.4
-
10
-
-
85050160774
-
Probabilistic encryption & how to play mental poker keeping secret all partial information
-
New York, NY, USA, ACM
-
S. Goldwasser and S. Micali. Probabilistic encryption & how to play mental poker keeping secret all partial information. In STOC '82: Proceedings of the fourteenth annual ACM symposium on Theory of Computing, pages 365-377, New York, NY, USA, 1982. ACM.
-
(1982)
STOC '82: Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
13
-
-
84989949883
-
Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware
-
D. Basin, U. Maurer, A.-R. Sadeghi, and D. Naccache, editors, Springer Berlin Heidelberg
-
Y. K. Lee, L. Batina, D. Singelee, B. Preneel, and I. Verbauwhede. Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware. In D. Basin, U. Maurer, A.-R. Sadeghi, and D. Naccache, editors, Towards Hardware-Intrinsic Security, Information Security and Cryptography, pages 237-257. Springer Berlin Heidelberg, 2010.
-
(2010)
Towards Hardware-Intrinsic Security, Information Security and Cryptography
, pp. 237-257
-
-
Lee, Y.K.1
Batina, L.2
Singelee, D.3
Preneel, B.4
Verbauwhede, I.5
-
14
-
-
79957460557
-
-
Technical report, BRIDGE Project, December
-
M. Lehtonen, J. Al-Kassab, F. Michahelles, and O. Kasten. Anti-counterfeiting business case report. Technical report, BRIDGE Project, December 2007.
-
(2007)
Anti-counterfeiting Business Case Report
-
-
Lehtonen, M.1
Al-Kassab, J.2
Michahelles, F.3
Kasten, O.4
-
15
-
-
84889975404
-
From identification to authentication - A review of RFID product authentication techniques
-
D. C. Ranasinghe and P. H. Cole, editors, Springer Berlin Heidelberg
-
M. Lehtonen, T. Staake, and F. Michahelles. From identification to authentication - a review of RFID product authentication techniques. In D. C. Ranasinghe and P. H. Cole, editors, Networked RFID Systems and Lightweight Cryptography, pages 169-187. Springer Berlin Heidelberg, 2008.
-
(2008)
Networked RFID Systems and Lightweight Cryptography
, pp. 169-187
-
-
Lehtonen, M.1
Staake, T.2
Michahelles, F.3
-
16
-
-
84886218215
-
Public key cryptography and RFID tags
-
M. Abe, editor, Topics in Cryptology - The Cryptographers' Track at the RSA Conference 2007, Springer, February
-
M. McLoone and M. Robshaw. Public key cryptography and RFID tags. In M. Abe, editor, Topics in Cryptology - The Cryptographers' Track at the RSA Conference 2007, LNCS, volume 4337, pages 372-384. Springer, February 2007.
-
(2007)
LNCS
, vol.4337
, pp. 372-384
-
-
McLoone, M.1
Robshaw, M.2
-
17
-
-
35048866823
-
Method, sender apparatus and receiver apparatus for modulo operation
-
European patent application no. 91402958.2, Filed 10/27/1992
-
D. Naccache. Method, sender apparatus and receiver apparatus for modulo operation. European patent application no. 91402958.2, Filed 10/27/1992.
-
-
-
Naccache, D.1
-
19
-
-
70349087741
-
A low-resource public-key identification scheme for RFID tags and sensor nodes
-
D. A. Basin, S. Capkun, and W. Lee, editors, ACM
-
Y. Oren and M. Feldhofer. A low-resource public-key identification scheme for RFID tags and sensor nodes. In D. A. Basin, S. Capkun, and W. Lee, editors, WISEC, pages 59-68. ACM, 2009.
-
(2009)
WISEC
, pp. 59-68
-
-
Oren, Y.1
Feldhofer, M.2
-
20
-
-
0003614758
-
-
Technical report, MIT, Cambridge, MA, USA
-
M. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical report, MIT, Cambridge, MA, USA, 1979.
-
(1979)
Digitalized Signatures and Public-key Functions As Intractable As Factorization
-
-
Rabin, M.1
-
21
-
-
84948964832
-
Memory efficient variants of public-key schemes for smart card applications
-
A. D. Santis, editor, Advances in Cryptology - EUROCRYPT '94, Springer, January
-
A. Shamir. Memory efficient variants of public-key schemes for smart card applications. In A. D. Santis, editor, Advances in Cryptology - EUROCRYPT '94, LNCS, volume 950, page 445. Springer, January 1995.
-
(1995)
LNCS
, vol.950
, pp. 445
-
-
Shamir, A.1
-
22
-
-
33644541758
-
Extending the EPC network: The potential of RFID in anti-counterfeiting
-
New York, NY, USA, ACM
-
T. Staake, F. Thiesse, and E. Fleisch. Extending the EPC network: the potential of RFID in anti-counterfeiting. In Proceedings of the 2005 ACM symposium on Applied computing, SAC '05, pages 1607-1612, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 2005 ACM Symposium on Applied Computing, SAC '05
, pp. 1607-1612
-
-
Staake, T.1
Thiesse, F.2
Fleisch, E.3
|