-
1
-
-
33845240394
-
Crossing borders: Security and privacy issues of the european e-passport
-
Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. Springer, Heidelberg
-
Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing borders: Security and privacy issues of the european e-passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 152-167. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4266
, pp. 152-167
-
-
Hoepman, J.-H.1
Hubbers, E.2
Jacobs, B.3
Oostdijk, M.4
Schreur, R.W.5
-
2
-
-
78649989557
-
-
v0.34
-
Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, v0.34 (2010)
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
-
Pfitzmann, A.1
Hansen, M.2
-
3
-
-
43149103199
-
RFID security: Tradeoffs between security and efficiency
-
Damgård, I., Pedersen, M.Ø.: RFID security: Tradeoffs between security and efficiency. In: CT-RSA, pp. 318-332 (2008)
-
(2008)
CT-RSA
, pp. 318-332
-
-
Damgård, I.1
Pedersen, M.Ø.2
-
5
-
-
67650674080
-
A Survey of RFID Privacy Approaches
-
Langheinrich, M.: A Survey of RFID Privacy Approaches. Personal and Ubiquitous Computing 13(6), 413-421 (2009)
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 413-421
-
-
Langheinrich, M.1
-
6
-
-
58149100777
-
Secure mobile RFID system against privacy and security problems
-
Kim, I.J., Choi, E.Y., Lee, D.H.: Secure mobile RFID system against privacy and security problems. In: SecPerU 2007 (2007)
-
(2007)
SecPerU 2007
-
-
Kim, I.J.1
Choi, E.Y.2
Lee, D.H.3
-
7
-
-
0019009078
-
OSI reference model - The ISO model of architecture for open systems interconnection
-
Zimmermann, H.: OSI reference model - The ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28(4), 425-432 (1980)
-
(1980)
IEEE Transactions on Communications
, vol.28
, Issue.4
, pp. 425-432
-
-
Zimmermann, H.1
-
8
-
-
26444478592
-
RFID traceability: A multilayer problem
-
S. Patrick, A., Yung, M. (eds.) FC 2005. Springer, Heidelberg
-
Avoine, G., Oechslin, P.: RFID traceability: A multilayer problem. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125-140. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
10
-
-
33751067978
-
Practical attacks on proximity identification systems (short paper)
-
Hancke, G.P.: Practical attacks on proximity identification systems (short paper). In: IEEE Symposium on Security and Privacy, pp. 328-333 (2006)
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 328-333
-
-
Hancke, G.P.1
-
12
-
-
85066934773
-
Physical-layer identification of RFID devices
-
Danev, B., Heydt-Benjamin, T.S., Čapkun, S.: Physical-layer identification of RFID devices. In: USENIX, pp. 125-136 (2009)
-
(2009)
USENIX
, pp. 125-136
-
-
Danev, B.1
Heydt-Benjamin, T.S.2
Čapkun, S.3
-
13
-
-
70350597641
-
Algebraic attacks on RFID protocols
-
Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. Springer, Heidelberg
-
van Deursen, T., Radomirović, S.: Algebraic attacks on RFID protocols. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. LNCS, vol. 5746, pp. 38-51. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5746
, pp. 38-51
-
-
Van Deursen, T.1
Radomirović, S.2
-
14
-
-
2942625823
-
Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers
-
Henrici, D., Müller, P.: Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers. In: PerCom Workshops, pp. 149-153 (2004)
-
(2004)
PerCom Workshops
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
16
-
-
77955313332
-
A Traceability Attack against e-Passports
-
Sion, R. (ed.) FC 2010. Springer, Heidelberg
-
Chothia, T., Smirnov, V.: A Traceability Attack against e-Passports. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 20-34. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6052
, pp. 20-34
-
-
Chothia, T.1
Smirnov, V.2
-
17
-
-
78650146719
-
Modeling privacy for off-line RFID systems
-
Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. Springer, Heidelberg
-
Garcia, F.D., van Rossum, P.: Modeling privacy for off-line RFID systems. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 194-208. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6035
, pp. 194-208
-
-
Garcia, F.D.1
Van Rossum, P.2
-
18
-
-
57049128814
-
Dismantling MIFARE classic
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Garcia, F.D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97-114. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 97-114
-
-
Garcia, F.D.1
De Koning Gans, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
19
-
-
70350601194
-
Wirelessly pickpocketing a MIFARE classic card
-
Garcia, F.D., van Rossum, P., Verdult, R., Schreur, R.W.: Wirelessly pickpocketing a MIFARE classic card. In: IEEE Security and Privacy, pp. 3-15 (2009)
-
(2009)
IEEE Security and Privacy
, pp. 3-15
-
-
Garcia, F.D.1
Van Rossum, P.2
Verdult, R.3
Schreur, R.W.4
-
20
-
-
79958013347
-
Sneltreinvaart je privacy kwijt
-
(in Dutch). October
-
Teepe, W.: In sneltreinvaart je privacy kwijt (in Dutch). Privacy & Informatie (October 2008)
-
(2008)
Privacy & Informatie
-
-
Teepe, W.1
-
21
-
-
33845549148
-
Imaging and analysis of GSM SIM cards
-
Swenson, C., Manes, G., Shenoi, S.: Imaging and analysis of GSM SIM cards. In: IFIP Int. Conf. Digital Forensics, pp. 205-216 (2005)
-
(2005)
IFIP Int. Conf. Digital Forensics
, pp. 205-216
-
-
Swenson, C.1
Manes, G.2
Shenoi, S.3
-
22
-
-
3042776963
-
Time and date issues in forensic computing - A case study
-
Boyd, C., Forster, P.: Time and date issues in forensic computing - A case study. Digital Investigation 1(1), 18-23 (2004)
-
(2004)
Digital Investigation
, vol.1
, Issue.1
, pp. 18-23
-
-
Boyd, C.1
Forster, P.2
-
24
-
-
78650089685
-
EC-RAC: Enriching a capacious RFID attack collection
-
Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
-
van Deursen, T., Radomirović, S.: EC-RAC: Enriching a capacious RFID attack collection. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 75-90. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6370
, pp. 75-90
-
-
Van Deursen, T.1
Radomirović, S.2
-
25
-
-
77955457549
-
How unique is your web browser?
-
Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. Springer, Heidelberg
-
Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1-18. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6205
, pp. 1-18
-
-
Eckersley, P.1
-
27
-
-
77957367324
-
-
Office of Fair Trading: Personal current accounts in the UK (2008), http://www.oft.gov.uk/OFTwork/markets-work/completed/personal/
-
(2008)
Personal Current Accounts in the UK
-
-
|