-
1
-
-
33744957484
-
Adversarial model for radio frequency identification
-
G. Avoine, "Adversarial Model for Radio Frequency Identification," Cryptology ePrint Archive, Report 2005/049, http:// eprint.iacr.org/2005/049, 2005.
-
(2005)
Cryptology EPrint Archive, Report 2005/049
-
-
Avoine, G.1
-
2
-
-
79957592918
-
Bibliography on security and privacy in RFID systems
-
Cambridge, Massachusetts, June
-
G. Avoine, "Bibliography on Security and Privacy in RFID Systems," Massachusetts Inst. of Technology, Cambridge, Massachusetts, http://lasecwww.epfl.ch/~gavoine/rfid/, June 2007.
-
(2007)
Massachusetts Inst. of Technology
-
-
Avoine, G.1
-
4
-
-
50049108255
-
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
-
M. Burmester, T. van Le, and B. de Medeiros, "Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols," Proc. Securecomm and Workshops (SECCOMM '06), pp. 1-9, 2006.
-
(2006)
Proc. Securecomm and Workshops (SECCOMM '06)
, pp. 1-9
-
-
Burmester, M.1
Van Le, T.2
De Medeiros, B.3
-
5
-
-
60449095092
-
Security analysis of the SASI protocol
-
Jan.-Mar.
-
T. Cao, E. Bertino, and H. Li, "Security Analysis of the SASI Protocol," IEEE Trans. Dependable and Secure Computing, vol. 6, no. 1, pp. 73-77, Jan.-Mar. 2009.
-
(2009)
IEEE Trans. Dependable and Secure Computing
, vol.6
, Issue.1
, pp. 73-77
-
-
Cao, T.1
Bertino, E.2
Li, H.3
-
6
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
DOI 10.1109/TDSC.2007.70226
-
H. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 4, pp. 337- 340, Oct.-Dec. 2007. (Pubitemid 350125898)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
7
-
-
77952285870
-
Security of ultra-lightweight RFID authentication protocols and its improvements
-
July
-
H. Chien and C. Hwang, "Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements," ACM SIGOPS Operating Systems Rev., vol. 41, no. 4, pp. 83-86, July 2007.
-
(2007)
ACM SIGOPS Operating Systems Rev.
, vol.41
, Issue.4
, pp. 83-86
-
-
Chien, H.1
Hwang, C.2
-
8
-
-
43149103199
-
RFID security: Tradeoffs between security and efficiency
-
I. Damgard and M. ∅stergaard, "RFID Security: Tradeoffs between Security and Efficiency," Proc. RSA Conf., pp. 318-332, 2008.
-
(2008)
Proc. RSA Conf.
, pp. 318-332
-
-
Damgard, I.1
Estergaard, M.2
-
9
-
-
57049137188
-
A new formal proof model for RFID location privacy
-
J.-H. Ha, S.-J. Moon, J. Zhou, and J.-C. Ha, "A New Formal Proof Model for RFID Location Privacy," Proc. 13th European Symp. Research in Computer Security (ESORICS '08), pp. 267-281, 2008.
-
(2008)
Proc. 13th European Symp. Research in Computer Security (ESORICS '08)
, pp. 267-281
-
-
Ha, J.-H.1
Moon, S.-J.2
Zhou, J.3
Ha, J.-C.4
-
11
-
-
44449155290
-
HB#: Increasing the security and efficiency of HB +
-
H. Gilbert, M.J.B. Robshaw, and Y. Seurin, "HB#: Increasing the Security and Efficiency of HB + ," Proc. EUROCRYPT '08, pp. 361- 378, 2008.
-
(2008)
Proc. EUROCRYPT '08
, pp. 361-378
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
12
-
-
54249085502
-
Good variants of HB + are hard to find
-
H. Gilbert, M.J.B. Robshaw, and Y. Seurin, "Good Variants of HB + Are Hard to Find," Proc. Financial Cryptography '08, pp. 156- 170, 2008.
-
(2008)
Proc. Financial Cryptography '08
, pp. 156-170
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
13
-
-
27644472569
-
+: A provably secure lightweight authentication protocol
-
DOI 10.1049/el:20052622
-
H. Gilbert, M.J.B. Robshaw, and H. Sibert, "An Active Attack against HB + a Provably Secure Lightweight Authentication Protocol," Electronics Letters, vol. 41, no. 21, pp. 1169-1170, 2005. (Pubitemid 41560540)
-
(2005)
Electronics Letters
, vol.41
, Issue.21
, pp. 1169-1170
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
14
-
-
79957593663
-
Cryptanalysis of the SASI ultralightweight RFID authentication protocol
-
May
-
J.C. Hernandez-Castro, J.M.E. Tapiador, P. Peris-Lopez, and J.-J. Quisquater, "Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol," Proc. Int'l Workshop on Coding and Cryptography (WCC '09), May 2009.
-
(2009)
Proc. Int'l Workshop on Coding and Cryptography (WCC '09)
-
-
Hernandez-Castro, J.C.1
Tapiador, J.M.E.2
Peris-Lopez, P.3
Quisquater, J.-J.4
-
15
-
-
45449101594
-
The vision of secure RFID
-
Aug.
-
A. Juels, "The Vision of Secure RFID," Proc. IEEE, vol. 95, no. 8, pp. 1507-1508, Aug. 2007.
-
(2007)
Proc. IEEE
, vol.95
, Issue.8
, pp. 1507-1508
-
-
Juels, A.1
-
16
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
DOI 10.1109/MSP.2005.78
-
A. Juels, R. Pappu, and S. Garfinkel, "RFID Privacy: An Overview of Problems and Proposed Solutions," IEEE Security and Privacy, vol. 3, no. 3, pp. 34-43, May/June 2005. (Pubitemid 40860471)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
17
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
A. Juels and S. Weiss, "Authenticating Pervasive Devices with Human Protocols," Proc. CRYPTO '05, pp. 293-308, 2005.
-
(2005)
Proc. CRYPTO '05
, pp. 293-308
-
-
Juels, A.1
Weiss, S.2
-
21
-
-
70350625235
-
Advances in ultralightweight cryptography for low-cost RFID Tags: Gossamer protocol
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M.E. Tapiador, and A. Ribagorda, "Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol," Proc. Int'l Symp. Web Information Systems and Applications (WISA '08), pp. 56-68, 2008.
-
(2008)
Proc. Int'l Symp. Web Information Systems and Applications (WISA '08)
, pp. 56-68
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Tapiador, J.M.E.3
Ribagorda, A.4
-
22
-
-
57049184162
-
RFID privacy models revisited
-
C. Yu Ng and W. Susilo, Y. Mu, and R. Safavi-Naini, "RFID Privacy Models Revisited," Proc. European Symp. Research in Computer Security: Computer Security (ESORICS '08), pp. 251-256, 2008.
-
(2008)
Proc. European Symp. Research in Computer Security: Computer Security (ESORICS '08)
, pp. 251-256
-
-
Yu Ng, C.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
23
-
-
58349109583
-
On the security of HB# against a Man-in-the-Middle Attack
-
K. Ouafi, R. Overbeck, and S. Vaudenay, "On the Security of HB# against a Man-in-the-Middle Attack," Proc. Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '08), pp. 108-124, 2008.
-
(2008)
Proc. Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '08)
, pp. 108-124
-
-
Ouafi, K.1
Overbeck, R.2
Vaudenay, S.3
-
26
-
-
70450265312
-
Cryptanalysis of a new ultralightweight RFID authentication protocol-SASI
-
Oct.-Dec.
-
R.C.-W. Phan, "Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI," IEEE Trans. Dependable and Secure Computing, vol. 6, no. 4, pp. 316-320, Oct.-Dec. 2009.
-
(2009)
IEEE Trans. Dependable and Secure Computing
, vol.6
, Issue.4
, pp. 316-320
-
-
Phan, R.C.-W.1
-
27
-
-
36248971663
-
LMAP: A real lightweight mutual authentication protocol for low-cost RFID Tags
-
July
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags," Proc. Second Workshop RFID Security, July 2006.
-
(2006)
Proc. Second Workshop RFID Security
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
28
-
-
33845455482
-
EMAP: An efficient mutual-authentication protocol for low-cost RFID tags
-
On the Move to Meaningful Internet Syst. 2006: OTM 2006 Workshops - OTM Confed. Int. Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerS
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags," Proc. OTM '06 Workshop, pp. 352- 361, 2006. (Pubitemid 44891824)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4277 LNCS - I
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
29
-
-
33750067948
-
2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
-
Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags," Proc. Ubiquitous Intelligence and Computing, pp. 912-923, 2006. (Pubitemid 44577871)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4159
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
30
-
-
67649545291
-
-
eprint archieve, Report 83, Feb.
-
H. Sun, W. Ting, and K. Wang, "On the Security of Chien's Ultralightweight RFID Authentication Protocol," eprint archieve, Report 83, Feb. 2008.
-
(2008)
On the Security of Chien's Ultralightweight RFID Authentication Protocol
-
-
Sun, H.1
Ting, W.2
Wang, K.3
-
31
-
-
50249161524
-
SQUASHA New MAC with provable security properties for highly constrained devices such as RFID tags
-
A. Shamir, "SQUASHA New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags," Proc. Fast Software Encryption (FSE '08), pp. 144-157, 2008.
-
(2008)
Proc. Fast Software Encryption (FSE '08)
, pp. 144-157
-
-
Shamir, A.1
|