-
1
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
-
Chien H. Y., Chen C. H., Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards Computer Standards and Interfaces 2007 29 2 254 259
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.Y.1
Chen, C.H.2
-
2
-
-
24944575863
-
-
RFID Privacy Work-6 shop, MIT, MA, USA
-
Ohkubo M., Suzuki K., Kinoshita S., Cryptographic approach to privacy-friendly tags. RFID Privacy Work-6 shop, MIT, MA, USA, 2003
-
(2003)
Cryptographic Approach to Privacy-friendly Tags
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
3
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
-
Rhee K., Kwak J., Kim S., Won D., Hutter D., Ullmann M., Challenge-response based on RFID authentication protocol for distributed database environment 3450 Proceedings of the International Conference on Security in Pervasive Computing (SPC '05) 2005 Berlin, Germany Springer 70 84 Lecture Notes in Computer Science (Pubitemid 41274193)
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
4
-
-
38149127568
-
Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
-
January 2006 Hiroshima, Japan
-
Nguyen Duc D., Park J. M., Lee H. R., Kim K. J., Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning Proceedings of the Symposium on Cryptography and Information Security January 2006 Hiroshima, Japan
-
Proceedings of the Symposium on Cryptography and Information Security
-
-
Nguyen Duc, D.1
Park, J.M.2
Lee, H.R.3
Kim, K.J.4
-
5
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
Alexandria, Va, USA ACM Press
-
Song B., Mitchell C. J., Gligor V. D., Hubaux J., Poovendran R., RFID authentication protocol for low-cost tags Proceedings of the ACM Conference on Wireless Network Security (WiSec '08) 2008 Alexandria, Va, USA ACM Press 140 147
-
(2008)
Proceedings of the ACM Conference on Wireless Network Security (WiSec '08)
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
Gligor, V.D.3
Hubaux, J.4
Poovendran, R.5
-
8
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
October 2004 Washington, DC, USA ACM Press
-
Molnar D., Wagner D., Pfitzmann B., Liu P., Privacy and security in library RFID: issues, practices, and architectures Proceedings of the ACM Conference on Computer and Communications Security (CCS '04) October 2004 Washington, DC, USA ACM Press 210 219
-
Proceedings of the ACM Conference on Computer and Communications Security (CCS '04)
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
Pfitzmann, B.3
Liu, P.4
-
9
-
-
38149047468
-
Low-cost and strong-security RFID authentication protocol
-
Ha J. C., Ha J. H., Moon S. J., Gonzalez Nieto J. M., Boyd C., Low-cost and strong-security RFID authentication protocol 4809 Proceedings of the EUC Workshops 2007 Berlin, Germany Springer 795 807 Lecture Notes in Computer Science
-
Proceedings of the EUC Workshops 2007 Berlin, Germany Springer Lecture Notes in Computer Science
, vol.4809
, pp. 795-807
-
-
Ha, J.C.1
Ha, J.H.2
Moon, S.J.3
Gonzalez Nieto, J.M.4
Boyd, C.5
-
10
-
-
44649155143
-
A family of dunces: Trivial RFID identification and authentication protocols
-
REPORT 2006/015
-
Tsudik G., A family of dunces: trivial RFID identification and authentication protocols Cryptology ePrint Archive 2007 Report 2006/015
-
(2007)
Cryptology EPrint Archive
-
-
Tsudik, G.1
-
13
-
-
38149038702
-
On privacy models for RFID
-
Berlin, Germany Springer Lecture Notes in Computer Science
-
Vaudenay S., On privacy models for RFID 4833 Proceedings of the Advances in Cryptology (ASIACRYPT '07) 2007 Berlin, Germany Springer 68 87 Lecture Notes in Computer Science
-
(2007)
Proceedings of the Advances in Cryptology (ASIACRYPT '07)
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
14
-
-
55649115408
-
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
-
Baltimore, Md, USA IEEE
-
Burmester M., Le T. V., Medeiros B. D., Provably secure ubiquitous systems: universally composable RFID authentication protocols Proceedings of the Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm '06) 2006 Baltimore, Md, USA IEEE
-
(2006)
Proceedings of the Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm '06)
-
-
Burmester, M.1
Le, T.V.2
Medeiros, B.D.3
-
18
-
-
38049125926
-
LRMAP: Lightweight and resynchronous mutual authentication protocol for RFID system
-
Berlin, Germany Springer Lecture Notes in Computer Science
-
Ha J., Ha J., Moon S., Boyd C., Stajano F., Kim H.-J., Chae J.-S., Kim S.-D., LRMAP: lightweight and resynchronous mutual authentication protocol for RFID system 4412 Proceedings of the International Conference on Ubiquitous Convergence Technology (ICUCT '07) 2007 Berlin, Germany Springer 80 89 Lecture Notes in Computer Science
-
(2007)
Proceedings of the International Conference on Ubiquitous Convergence Technology (ICUCT '07)
, vol.4412
, pp. 80-89
-
-
Ha, J.1
Ha, J.2
Moon, S.3
Boyd, C.4
Stajano, F.5
Kim, H.-J.6
Chae, J.-S.7
Kim, S.-D.8
-
20
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Berlin, Germany Springer Lecture Notes in Computer Science
-
Weis S., Sarma S., Rivest R., Engels D., Hutter D., Mller G., Stephan W., Ullmann M., Security and privacy aspects of low-cost radio frequency identification systems 2802 Proceedings of the International Conference on Security in Pervasive Computing (SPC '03) 2003 Berlin, Germany Springer 201 212 Lecture Notes in Computer Science
-
(2003)
Proceedings of the International Conference on Security in Pervasive Computing (SPC '03)
, vol.2802
, pp. 201-212
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
Hutter, D.5
Mller, G.6
Stephan, W.7
Ullmann, M.8
-
22
-
-
33751513718
-
Enhancing security of EPC global gen-2 RFID tag against traceability and cloning
-
Hiroshima, Japan The Institute of Electronics, Information and Communication Engineers
-
Duc D. N., Park J., Lee H., Kim K., Enhancing security of EPC global gen-2 RFID tag against traceability and cloning Proceedings of the Symposium on Cryptography and Information Security (SCIS '06) 2006 Hiroshima, Japan The Institute of Electronics, Information and Communication Engineers
-
(2006)
Proceedings of the Symposium on Cryptography and Information Security (SCIS '06)
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
23
-
-
38349066494
-
An efficient and secure RFID security method with ownership transfer
-
Berlin, Germany Springer Lecture Notes in Computer Science
-
Osaka K., Takagi T., Yamazaki K., Takahashi O., Wang Y., Cheung Y., Liu H., An efficient and secure RFID security method with ownership transfer 4456 Proceedings of the Computational Intelligence and Security (CIS '06) 2006 Berlin, Germany Springer 778 787 Lecture Notes in Computer Science
-
(2006)
Proceedings of the Computational Intelligence and Security (CIS '06)
, vol.4456
, pp. 778-787
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
Wang, Y.5
Cheung, Y.6
Liu, H.7
-
24
-
-
34247218520
-
RFID mutual authentication scheme based on synchronized secret information
-
Hiroshima, Japan The Institute of Electronics, Information and Communication Engineers
-
Lee S., Asano T., Kim K., RFID mutual authentication scheme based on synchronized secret information Proceedings of the Symposium on Cryptography and Information Security (SCIS '06) 2006 Hiroshima, Japan The Institute of Electronics, Information and Communication Engineers
-
(2006)
Proceedings of the Symposium on Cryptography and Information Security (SCIS '06)
-
-
Lee, S.1
Asano, T.2
Kim, K.3
-
25
-
-
38149085988
-
An efficient authentication protocol for RFID systems resistant to active attacks
-
Berlin, Germany Springer Lecture Notes in Computer Science
-
Peris-Lopez P., Hernandez-Castro J. C., Estevez-Tapiador J. M., Ribagorda A., An efficient authentication protocol for RFID systems resistant to active attacks 4809 Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing (EUC '07) 2007 Berlin, Germany Springer 781 794 Lecture Notes in Computer Science
-
(2007)
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing (EUC '07)
, vol.4809
, pp. 781-794
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
26
-
-
59249097693
-
A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
-
Fouladgar S., Afifi H., A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags Journal of Communications 2007 2 6 6 13
-
(2007)
Journal of Communications
, vol.2
, Issue.6
, pp. 6-13
-
-
Fouladgar, S.1
Afifi, H.2
-
29
-
-
70349155465
-
Attacks and improvements to an RFID mutual authentication protocol and its extensions
-
Zurich, Switzerland ACM Press
-
Cai S., Li Y., Li T., Deng R., Attacks and improvements to an RFID mutual authentication protocol and its extensions Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec '09) 2009 Zurich, Switzerland ACM Press 51 58
-
(2009)
Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec '09)
, pp. 51-58
-
-
Cai, S.1
Li, Y.2
Li, T.3
Deng, R.4
-
30
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
-
Advances in Cryptology - CRYPTO '96
-
Kocher P., Koblitz N., Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems 1109 Proceedings of the Advances in Cryptology (CRYPTO 96) 1996 Berlin, Germany Springer 104 113 Lecture Notes in Computer Science (Pubitemid 126106234)
-
(1996)
Lecture Notes in Computer Science
, Issue.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
33
-
-
33744957484
-
Adversarial model for radio frequency identification
-
REPORT 2005/049
-
Avoine G., Adversarial model for radio frequency identification Cryptology ePrint Archieve 2005 Report 2005/049. http://eprint.iacr.org
-
(2005)
Cryptology EPrint Archieve
-
-
Avoine, G.1
-
35
-
-
44649113207
-
Untraceability of RFID protocols
-
DOI 10.1007/978-3-540-79966-5-1, Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2 International Workshop, WISTP 2008, Proceedings
-
Deursen T. V., Mauw S., Radomirovic S., Untraceability of RFID protocols 5019 Proceedings of the Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP 08) 2008 Berlin, Germany Springer 1 15 Lecture Notes in Computer Science (Pubitemid 351775575)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.5019
, pp. 1-15
-
-
Van Deursen, T.1
Mauw, S.2
Radomirovic, S.3
-
36
-
-
33745621564
-
Reducing time complexity in RFID systems
-
Berlin, Germany Springer Lecture Notes in Computer Science
-
Avoine G., Dysli E., Oechslin P., Preneel B., Tavares S., Reducing time complexity in RFID systems 3897 Proceedings of the Selected Areas in Cryptography (SAC '05) 2005 Berlin, Germany Springer 291 306 Lecture Notes in Computer Science
-
(2005)
Proceedings of the Selected Areas in Cryptography (SAC '05)
, vol.3897
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
Preneel, B.4
Tavares, S.5
|