-
1
-
-
24644498485
-
RFID: A Technical Overview and Its Applications to the Enterprises
-
Published by the IEEE Computer Society, June
-
R. Weinstein, "RFID: A Technical Overview and Its Applications to the Enterprises," IT Professional., Published by the IEEE Computer Society, vol. 7, Issue 3, pp. 27-33, June, 2005.
-
(2005)
IT Professional
, vol.7
, Issue.3
, pp. 27-33
-
-
Weinstein, R.1
-
2
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
DOI 10.1109/MSP.2005.78
-
S. L. Garfinkel, A. Juels, and R. Pappu, "RFID privacy: an overview of problems and proposed solutions," Security & Privacy, Published by the IEEE Computer Society, vol. 3, Issue 3, pp, 34-43, June, 2005. (Pubitemid 40860471)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
4
-
-
33144457479
-
RFID Security and Privacy: A Research Survey
-
Feb.
-
A. Juels, "RFID Security and Privacy: A Research Survey," IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 381-394, Feb. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
5
-
-
33144458681
-
Would Macy's scan Gimbels? competitive intelligence and RFID
-
S. Garfinkel and B. Rosenberg, Eds. Reading, MA: Addison-Wesley
-
R. Stapleton-Gray, "Would Macy's scan Gimbels? competitive intelligence and RFID," in RFID: Applications, Security, and Privacy, S. Garfinkel and B. Rosenberg, Eds. Reading, MA: Addison-Wesley, , pp. 283-290, 2005.
-
(2005)
RFID: Applications, Security, and Privacy
, pp. 283-290
-
-
Stapleton-Gray, R.1
-
6
-
-
84935078039
-
Security weaknesses in Bluetooth
-
The Cryptographer's Track at RSA, D. Naccache, Ed. New York, Springer-Verlag
-
M. Jakobsson and S. Wetzel, "Security weaknesses in Bluetooth," in The Cryptographer's Track at RSA, D. Naccache, Ed. New York, Springer-Verlag, vol. 2020, Lecture Notes in Computer Science, pp. 176-191, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
7
-
-
26444478592
-
RFID Traceability: A Multilayer Problem
-
Financial Cryptography - FC'05, Springer
-
G. Avoine and P. Oechslin, "RFID Traceability: A Multilayer Problem," Financial Cryptography - FC'05, LNCS, Springer, 2005.
-
(2005)
LNCS
-
-
Avoine, G.1
Oechslin, P.2
-
8
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Proceedings of the 1st Security in Pervasive Computing
-
S. Weis, S. Sarma, R. Rivest, and D. Engels. "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Proceedings of the 1st Security in Pervasive Computing, LNCS, vol. 2802, pp. 201-212, 2004.
-
(2004)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
9
-
-
33144487342
-
An Active Attack Against HB+ - A Provably Secure Lightweight Protocol
-
Report 2005/237
-
H. Gilbert, M. Robshaw, and H. Sibert. "An Active Attack Against HB+ - A Provably Secure Lightweight Protocol." Cryptology ePrint Archive, Report 2005/237, 2005. http://eprint.iacr.org.
-
(2005)
Cryptology ePrint Archive
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
10
-
-
0038307567
-
Mobility Management in Integrated UMTS/WLAN Networks
-
May
-
Vijay K. Varma, et al., "Mobility Management in Integrated UMTS/WLAN Networks," Proceedings of IEEE ICC 2003, vol. 2, pp.1048-1053, May, 2003.
-
(2003)
Proceedings of IEEE ICC 2003
, vol.2
, pp. 1048-1053
-
-
Varma, V.K.1
-
11
-
-
33845920117
-
HB++: A Lightweight Authentication Protocol Secure Against Some Attacks
-
J. Bringer, H. Chabanne, and E. Dottax, "HB++: a Lightweight Authentication Protocol Secure Against Some Attacks," IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006.
-
IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
13
-
-
45749088988
-
The Security of EPC Gen2 Compliant RFID Protocols
-
ACNS, S. M. Bellovin, R. Gennaro, A. D. Keromytis, and M. Yung, Eds. Springer
-
M. Burmester, and B. de Medeiros, "The Security of EPC Gen2 Compliant RFID Protocols," In ACNS, S. M. Bellovin, R. Gennaro, A. D. Keromytis, and M. Yung, Eds. Lecture Notes in Computer Science, Springer, vol. 5037, pp 490-506, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5037
, pp. 490-506
-
-
Burmester, M.1
De Medeiros, B.2
-
14
-
-
70349952297
-
Secure EPC Gen2 Compliant Radio Frequency Identification
-
ADHOCNOW, P. M. Ruiz and J. J. Garcia-Luna-Aceves, Eds. Springer
-
M. Burmester, B. de Medeiros, J. Munilla, and A. Peinado, " Secure EPC Gen2 Compliant Radio Frequency Identification," In ADHOCNOW, P. M. Ruiz and J. J. Garcia-Luna-Aceves, Eds. Lecture Notes in Computer Science, vol. 5793. Springer, pp. 227-240, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5793
, pp. 227-240
-
-
Burmester, M.1
De Medeiros, B.2
Munilla, J.3
Peinado, A.4
-
15
-
-
46249106254
-
LFSR Polynomial and Seed Selection Using Genetic Algorithm
-
IEEE
-
E. Aleksejev, A. Jutman, and R. Ubar, "LFSR Polynomial and Seed Selection Using Genetic Algorithm," Inproceeding, Baltic Electronics Conference. IEEE, pp.179-182, 2006.
-
(2006)
Inproceeding, Baltic Electronics Conference
, pp. 179-182
-
-
Aleksejev, E.1
Jutman, A.2
Ubar, R.3
-
16
-
-
84947914704
-
Fast Hashing and Stream Encryption with PANAMA
-
Fast Software Encryption
-
Joan Daemen and Craig Clapp, "Fast Hashing and Stream Encryption with PANAMA," Fast Software Encryption, Lecture Notes in Computer Science, vol. 1372, pp.60-74, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1372
, pp. 60-74
-
-
Daemen, J.1
Clapp, C.2
-
17
-
-
84871733065
-
-
eSTREAM Phase 3 Candidates.
-
eSTREAM Phase 3 Candidates. eSTREAM, ECRYPT Stream Cipher Project. http://www.ecrypt.eu.org/stream/phase3list.html.
-
eSTREAM, ECRYPT Stream Cipher Project
-
-
-
18
-
-
84860313632
-
Comparison of hardware performance of selected phase II eSTREAM candidates
-
eSTREAM, ECRYPT Stream Cipher Project, Report 2007/026
-
Gaj, K., Southern, G., Bachimanchi, R., "Comparison of hardware performance of selected phase II eSTREAM candidates", State of the Art of Stream Ciphers Workshop (SASC 2007), eSTREAM, ECRYPT Stream Cipher Project, Report 2007/026 (2007). http://www.ecrypt.eu.org/stream.
-
(2007)
State of the Art of Stream Ciphers Workshop (SASC 2007)
-
-
Gaj, K.1
Southern, G.2
Bachimanchi, R.3
|