-
2
-
-
14244253910
-
An approach to security and privacy of RFID system for supply chain
-
X. Gao, Z. Xiang, H. Wang, J. Shen, J. Huang and S. Song. An Approach to Security and Privacy of RFID System for Supply Chain. Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04), 2004
-
(2004)
Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04)
-
-
Gao, X.1
Xiang, Z.2
Wang, H.3
Shen, J.4
Huang, J.5
Song, S.6
-
7
-
-
34548353243
-
Is elliptic-curve cryptography suitable to secure RFID tags?
-
Graz, Austria, August
-
J. Wolkerstorfer. Is Elliptic-Curve Cryptography Suitable to Secure RFID Tags? Workshop on RFID and Light-weight Cryptography, Graz, Austria, August 2005.
-
(2005)
Workshop on RFID and Light-weight Cryptography
-
-
Wolkerstorfer, J.1
-
8
-
-
33745654539
-
RFID-tags for anti-counterfeiting
-
D.Pointcheval, editor of LNCS. Springer Verlag, February 13-17
-
P. Tuyls and L. Batina. RFID-tags for Anti-Counterfeiting. In D.Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, volume 3860 of LNCS, pages 115-131. Springer Verlag, February 13-17 2006.
-
(2006)
Topics in Cryptology - CT-RSA 2006
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
9
-
-
34547688845
-
Public-key cryp-tography for RFID-tags
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I.Verbauwhede. Public-Key Cryp-tography for RFID-Tags. In Proceedings of IEEE International Workshop on Pervasive Computing and Communication Security , 6 pages, 2007.
-
(2007)
Proceedings of IEEE International Workshop on Pervasive Computing and Communication Security
, pp. 6
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
10
-
-
49049105964
-
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
-
Y. K. Lee, L. Batina, and I. Verbauwhede. EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol. In 2008 IEEE International Conference on RFID , pages 97-104,2008.
-
(2008)
2008 IEEE International Conference on RFID
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
12
-
-
58449108568
-
Cryptanalysis of EC-RAC, a RFID identification protocol
-
Springer-Verlag
-
J.Bringer, H.Chabanne, and T.Icart. Cryptanalysis of EC-RAC, a RFID Identification Protocol. In International Conference on Cryptology and Network Security-CANS'08, Lecture Notes in Computer Science. Springer-Verlag, 2008.
-
(2008)
International Conference on Cryptology and Network Security-CANS'08, Lecture Notes in Computer Science
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
13
-
-
0000537828
-
Efficient identification and signatures for smartcards
-
GillesBrassard, editor of LNCS. SpringerVerlag
-
C.-P.Schnorr. Efficient Identification and Signatures for SmartCards. In GillesBrassard, editor, Advancesin Cryptology-CRYPTO'89, volume 435 of LNCS, pages239-252. SpringerVerlag,1989.
-
(1989)
Advancesin Cryptology-CRYPTO'89
, vol.435
, pp. 239-252
-
-
Schnorr, C.-P.1
-
14
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
E.F.Brickell, editor of LNCS. Springer Verlag
-
T.Okamoto. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. InE.F.Brickell, editor, Advances in Cryptology-CRYPTO'92, volume740 of LNCS, pages31-53. Springer Verlag, 1992.
-
(1992)
Advances in Cryptology-CRYPTO'92
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
|