-
1
-
-
34247512176
-
Radio frequency identification: Technologies, applications, and research issues
-
Xiao Y, Yu S, Wu K, Ni Q, Janecek C, Nordstad J,. Radio frequency identification: technologies, applications, and research issues. Wireless Communications and Mobile Computing 2006; 7 (4): 457-472.
-
(2006)
Wireless Communications and Mobile Computing
, vol.7
, Issue.4
, pp. 457-472
-
-
Xiao, Y.1
Yu, S.2
Wu, K.3
Ni, Q.4
Janecek, C.5
Nordstad, J.6
-
2
-
-
52249100684
-
-
EPCglobal
-
EPCglobal. EPCglobal website. Available from:.
-
EPCglobal Website
-
-
-
3
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
Juels A,. RFID security and privacy: a research survey. IEEE Journals on Selected Areas in Communications 2006; 24 (2): 381-394. (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
4
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Juels A, Rivest RL, Szydlo M,. The blocker tag: selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington, DC, U.S.A., October 2003; 103-111. (Pubitemid 40673793)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
6
-
-
33745797863
-
Untraceable RFID tag via insubvertible encryption
-
DOI 10.1145/1102120.1102134, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
Ateniese G, Camenisch J, de Medeiros B.,. Untraceable RFID tags via insubvertible encryption. Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005). ACM Press: Alexandria, VA, U.S.A., November 2005; 92-101. (Pubitemid 44021993)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 92-101
-
-
Ateniese, G.1
Camenisch, J.2
De Medeiros, B.3
-
8
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
Amalfi, Italia. Lecture Notes in Computer Science, 3352. Springer: Berlin, September
-
Juels A.,. Minimalist cryptography for low-cost RFID tags. Proceedings of Security in Communication Networks (SCN 2004), Amalfi, Italia. Lecture Notes in Computer Science, vol. 3352. Springer: Berlin, September 2004; 149-164.
-
(2004)
Proceedings of Security in Communication Networks (SCN 2004)
, pp. 149-164
-
-
Juels, A.1
-
9
-
-
64249137046
-
A hybrid approach for privacy-preserving RFID tags
-
Ryu E-K, Takagi T,. A hybrid approach for privacy-preserving RFID tags. Computer Standards and Interfaces 2009; 31 (4): 812-815.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.4
, pp. 812-815
-
-
Ryu, E.-K.1
Takagi, T.2
-
10
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification system
-
Boppard, Germany. Lecture Notes in Computer Science, Springer: Berlin, March
-
Weis SA, Sarma SE, Rivest LR, Engels WD,. Security and privacy aspects of low-cost radio frequency identification system. Proceedings of the 1st International Conference on Security in Pervasive Computing (SPC 2003), Boppard, Germany. Lecture Notes in Computer Science, vol. 2802. Springer: Berlin, March 2003; 201-212.
-
(2003)
Proceedings of the 1st International Conference on Security in Pervasive Computing (SPC 2003)
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, L.R.3
Engels, W.D.4
-
11
-
-
2942625823
-
Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers
-
IEEE Computer Society: Orlando, FL, U.S.A. March
-
Henrici D, Muller P,. Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers. Proceedings of Pervasive Computing and Communication Security (PerSec 2004). IEEE Computer Society: Orlando, FL, U.S.A., March 2004; 149-153.
-
(2004)
Proceedings of Pervasive Computing and Communication Security (PerSec 2004)
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
14
-
-
34748848124
-
Universally composable and forward-secure RFID authentication and authenticated key exchange
-
DOI 10.1145/1229285.1229319, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
van Le T, Burmester M, de Medeiros B,. Universally composable and forward secure RFID authentication and authenticated key exchange. Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), Singapore, March 2007; 242-252. (Pubitemid 47485405)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 242-252
-
-
Van Le, T.1
Burmester, M.2
De Medeiros, B.3
-
15
-
-
67349277179
-
PAP: A privacy and authentication protocol for passive RFID tags
-
Liu AX, Bailey LA,. PAP: a privacy and authentication protocol for passive RFID tags. Computer Communications 2009; 32 (7-10): 1194-1199.
-
(2009)
Computer Communications
, vol.32
, Issue.710
, pp. 1194-1199
-
-
Liu, A.X.1
Bailey, L.A.2
-
16
-
-
57049150751
-
A study on secure RFID mutual authentication scheme in pervasive computing environment
-
Kang S-Y, Lee D-G, Lee I-Y,. A study on secure RFID mutual authentication scheme in pervasive computing environment. Computer Communications 2008; 31 (18): 4248-4254.
-
(2008)
Computer Communications
, vol.31
, Issue.18
, pp. 4248-4254
-
-
Kang, S.-Y.1
Lee, D.-G.2
Lee, I.-Y.3
-
17
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Boston, MA, U.S.A. Lecture Notes in Computer Science, Springer: Berlin, August
-
Feldhofer M, Dominikus S, Wolkerstorfer J,. Strong authentication for RFID systems using the AES algorithm. Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), Boston, MA, U.S.A. Lecture Notes in Computer Science, vol. 3156. Springer: Berlin, August 2004; 357-370.
-
(2004)
Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004)
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
19
-
-
68249160977
-
Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications
-
Park JH,. Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications. International Journal of Communication Systems 2009; 22 (6): 959-969.
-
(2009)
International Journal of Communication Systems
, vol.22
, Issue.6
, pp. 959-969
-
-
Park, J.H.1
-
20
-
-
35248832722
-
Squealing euros: Privacy protection in RFID-enabled banknotes
-
Le Gosier, Guadeloupe, French West Indies. Lecture Notes in Computer Science, Springer: Berlin, January
-
Juels A, Pappu R,. Squealing euros: privacy protection in RFID-enabled banknotes. Proceedings of the Financial Cryptography (FC 2003), Le Gosier, Guadeloupe, French West Indies. Lecture Notes in Computer Science, vol. 2742. Springer: Berlin, January 2003; 103-121.
-
(2003)
Proceedings of the Financial Cryptography (FC 2003)
, vol.2742
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
21
-
-
33644534001
-
Lightweight authentication protocols for low-cost RFID tags
-
Seattle, WA, U.S.A., October
-
Vajda I, Butty'an L,. Lightweight authentication protocols for low-cost RFID tags. Proceedings of the Workshop on Security in Ubiquitous Computing (Ubicomp 2003), Seattle, WA, U.S.A., October 2003.
-
(2003)
Proceedings of the Workshop on Security in Ubiquitous Computing (Ubicomp 2003)
-
-
Vajda, I.1
Butty'An, L.2
-
22
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
-
Kingston, Canada. Lecture Notes in Computer Science, Springer: Berlin, August
-
David M, Andrea S, David W,. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. Selected Areas in Cryptography (SAC 2005), Kingston, Canada. Lecture Notes in Computer Science, vol. 3897. Springer: Berlin, August 2005; 276-290.
-
(2005)
Selected Areas in Cryptography (SAC 2005)
, vol.3897
, pp. 276-290
-
-
David, M.1
Andrea, S.2
David, W.3
-
25
-
-
26444443915
-
A scalable and provably secure hash-based RFID protocol
-
DOI 10.1109/PERCOMW.2005.12, 1392812, Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops
-
Avoine G, Oechslin P.,. A scalable and provably secure hash based RFID protocol. Proceedings of Pervasive Computing and Communication Security (PerSec 2005). IEEE Computer Society: Kauai Island, HI, March 2005; 110-114. (Pubitemid 43762830)
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops
, vol.2005
, pp. 110-114
-
-
Avoine, G.1
Oechslin, P.2
-
26
-
-
14844294769
-
Privacy and security in library RFID issues, practices, and architectures
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
Molnar D, Wagner D.,. Privacy and security in library RFID: issues, practices, and architectures. Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), Washington, DC, U.S.A., October 2004; 210-219. (Pubitemid 40338202)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
|