-
1
-
-
80052556044
-
-
3GPP; TSG SA. 3G security; security architecture (release 8). 3GPP TS 33.102, March 2009
-
3GPP; TSG SA. 3G security; security architecture (release 8). 3GPP TS 33.102, March 2009.
-
-
-
-
2
-
-
44149083053
-
The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application
-
DOI 10.1016/j.elerap.2006.12.004, PII S1567422307000026
-
Y.A. Au, and R.J. Kauffman The economics of mobile payments: understanding stakeholder issues for an emerging financial technology application Electronic Commerce Research and Applications 7 2 2008 141 164 (Pubitemid 351718564)
-
(2008)
Electronic Commerce Research and Applications
, vol.7
, Issue.2
, pp. 141-164
-
-
Au, Y.A.1
Kauffman, R.J.2
-
3
-
-
33845429530
-
Recommendation for the triple data encryption algorithm (TDEA) block cipher
-
revised, Computer Security Division, Computer Security Resource Center, National Institute of Standard and Technology, Gaithersburg, MD, May 19
-
Barker, W. C. Recommendation for the triple data encryption algorithm (TDEA) block cipher. NIST special publication SP 800-67 1.1, revised, Computer Security Division, Computer Security Resource Center, National Institute of Standard and Technology, Gaithersburg, MD, May 19, 2008. Available at csrc.nist.gov/publications/PubsSPs.html.
-
(2008)
NIST Special Publication SP 800-67 1.1
-
-
Barker, W.C.1
-
4
-
-
70349120905
-
Enhancement of the RFID security method with ownership transfer
-
Suwon, Korea, January ACM Press, New York, NY
-
Chen, H. B.; Lee, W. B.; Zhao, Y. H.; and Chen, Y. L. Enhancement of the RFID security method with ownership transfer. In Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, January 2009, ACM Press, New York, NY, 251-254.
-
(2009)
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
, pp. 251-254
-
-
Chen . H, B.1
Lee . W, B.2
Zhao . Y, H.3
Chen, Y.L.4
-
5
-
-
77950187346
-
Efficient secure group communications for SCADA
-
D. Choi, S. Lee, D. Won, and S. Kim Efficient secure group communications for SCADA IEEE Transactions on Power Delivery 25 2 2010 714 722
-
(2010)
IEEE Transactions on Power Delivery
, vol.25
, Issue.2
, pp. 714-722
-
-
Choi, D.1
Lee, S.2
Won, D.3
Kim, S.4
-
6
-
-
33750402779
-
Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience
-
Frederickton, New Brunswick, Canada, October 2004
-
Engberg, S.; Harning, M.; and Jensen, C. Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience. In Proceedings of the 2nd Annual Conference on Privacy, Security, and Trust, Frederickton, New Brunswick, Canada, October 2004, 13-15.
-
Proceedings of the 2nd Annual Conference on Privacy, Security, and Trust
, pp. 13-15
-
-
Engberg, S.1
Harning, M.2
Jensen, C.3
-
7
-
-
33845429016
-
A case against currently used hash functions in RFID protocols
-
On the Move to Meaningful Internet Syst. 2006: OTM 2006 Workshops - OTM Confed. Int. Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerS
-
Feldhofer, M.; and Rechberger, C. A case against currently used hash functions in RFID protocols. In Proceedings of the Workshop on RFID Security, Graz, Austria, July 13-14, 2006, 372-381. (Pubitemid 44891826)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4277
, pp. 372-381
-
-
Feldhofer, M.1
Rechberger, C.2
-
8
-
-
34548814766
-
Strong crypto for RFID tags - A comparison of low-power hardware implementations
-
4253019, 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007
-
Feldhofer, M.; and Wolkerstorfer, J. Strong crypto for RFID tags: A comparison of low-power hardware implementations. In Proceedings of the 2007 IEEE International Symposium on Circuits and Systems, New Orleans, LA, May 27-30, 2007, IEEE Computer Society Press, Washington, DC, 1839-1842. (Pubitemid 47448889)
-
(2007)
Proceedings - IEEE International Symposium on Circuits and Systems
, pp. 1839-1842
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
-
9
-
-
63149159973
-
An efficient delegation and transfer of ownership protocol for RFID tags
-
Vienna, Austria, September 24-25
-
Fouladgar, S.; and Afifi, H. An efficient delegation and transfer of ownership protocol for RFID tags. In Proceedings of the First International EURASIP Workshop on RFID Technology, Vienna, Austria, September 24-25, 2007a.
-
(2007)
Proceedings of the First International EURASIP Workshop on RFID Technology
-
-
Fouladgar, S.1
Afifi, H.2
-
10
-
-
63149151663
-
A simple delegation scheme for RFID systems (SiDeS)
-
Grapevine, TX, March 26-28 IEEE Computer Society Press, Washington, DC
-
Fouladgar, S.; and Afifi, H. A simple delegation scheme for RFID systems (SiDeS). In Proceedings of the 2007 IEEE International Conference on RFID, Grapevine, TX, March 26-28, 2007b, IEEE Computer Society Press, Washington, DC, 1-6.
-
(2007)
Proceedings of the 2007 IEEE International Conference on RFID
, pp. 1-6
-
-
Fouladgar, S.1
Afifi, H.2
-
11
-
-
59249097693
-
A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
-
S. Fouladgar, and H. Afifi A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags Journal of Communications 2 6 2007 6 13
-
(2007)
Journal of Communications
, vol.2
, Issue.6
, pp. 6-13
-
-
Fouladgar, S.1
Afifi, H.2
-
12
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
DOI 10.1109/MSP.2005.78
-
S. Garfinkel, A. Juels, and R. Pappu RFID privacy: an overview of problems and proposed solutions IEEE Security and Privacy 3 3 2005 34 43 (Pubitemid 40860471)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
16
-
-
77950800179
-
-
Tokyo, Japan
-
JR East. Mobile Suica. Tokyo, Japan. Available at www.jreast.co.jp/ mobilesuica/index.html.
-
Mobile Suica
-
-
East, J.R.1
-
17
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels RFID security and privacy: a research survey IEEE Journal on Selected Areas in Communications 24 2 2006 381 394 (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
20
-
-
35248846439
-
POP method: An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism
-
ACM Press, New York, NY
-
Koralalage, K.H.S.S.; Selim, M.R.; Miura, J.; Goto, Y.; and Cheng, J. POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism. In Proceedings of the 2007 ACM Symposium on Applied Computing, March 2007, ACM Press, New York, NY, 270-275.
-
Proceedings of the 2007 ACM Symposium on Applied Computing, March 2007
, pp. 270-275
-
-
Koralalage, K.H.S.S.1
Selim, M.R.2
Miura, J.3
Goto, Y.4
Cheng, J.5
-
21
-
-
33750949375
-
Privacy threats and issues in mobile RFID
-
Vienna, Austria, April 20-22, 2006, IEEE Computer Society Press, Washington, DC
-
Lee, H.; and Kim, J. Privacy threats and issues in mobile RFID. In Proceedings of the First International Conference on Availability, Reliability and Security, Vienna, Austria, April 20-22, 2006, IEEE Computer Society Press, Washington, DC, 510-514.
-
Proceedings of the First International Conference on Availability, Reliability and Security
, pp. 510-514
-
-
Lee, H.1
Kim, J.2
-
22
-
-
33745597876
-
A scalable, delegatable pseudonym. Protocol enabling ownership transfer of RFID tags (Extended Abstract)
-
DOI 10.1007/11693383-19, Selected Areas in Cryptography - 12th International Workshop, SAC 2005, Revised Selected Papers
-
Molnar, D.; Soppera, A.; and Wagner, D. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In B. Preneel, and S. E. Tavares (eds.), 12th International Workshop on Selected Areas in Cryptography, Kingston, Canada, Lecture Notes in Computer Science, Vol. 3897, August 11-12, 2005, Springer, New York, NY, 276-290. (Pubitemid 43986800)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3897
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
23
-
-
0038256558
-
-
National Institute of Standards and Technology. Advanced encryption standard (AES) Gaithersburg, MD, November
-
National Institute of Standards and Technology. Advanced encryption standard (AES). Federal information processing standards publication 197, Gaithersburg, MD, November 2001. Available at csrc.nist.gov/publications/fips/ fips197/fips-197.pdf.
-
(2001)
Federal Information Processing Standards Publication 197
-
-
-
24
-
-
57149100147
-
An efficient and secure RFID security method with ownership transfer
-
Guangzhou, China, November 3-6 IEEE Computer Society Press, Washington, DC
-
Osaka, K.; Takagi, T.; Yamazaki, K.; and Takahashi, O. An efficient and secure RFID security method with ownership transfer. In Proceedings of the 2006 International Conference on Computational Intelligence and Security, Guangzhou, China, November 3-6, 2006, IEEE Computer Society Press, Washington, DC, 1090-1095.
-
(2006)
Proceedings of the 2006 International Conference on Computational Intelligence and Security
, pp. 1090-1095
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
25
-
-
51849104796
-
Policy and role based mobile RFID user privacy data management system
-
April 7-11 Bahia, Salvador, Brazil
-
Park, N.; Song, Y.; and Won, D. Policy and role based mobile RFID user privacy data management system. In Proceedings of the Network Operations and Management Symposium, April 7-11, 2008, Bahia, Salvador, Brazil, 1003-1006.
-
(2008)
Proceedings of the Network Operations and Management Symposium
, pp. 1003-1006
-
-
Park, N.1
Song, Y.2
Won, D.3
-
26
-
-
34548860970
-
New light-weight crypto algorithms for RFID
-
4253020, 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007
-
Poschmann, A.; Leander, G.; Schramm, K.; and Paar, C. New light-weight crypto algorithms for RFID. In Proceedings of the IEEE International Symposium on Circuits and Systems, New Orleans, LA, May 27-30, 2007, IEEE Computer Society Press, Washington, DC, 1843-1846. (Pubitemid 47448890)
-
(2007)
Proceedings - IEEE International Symposium on Circuits and Systems
, pp. 1843-1846
-
-
Poschmann, A.1
Leander, G.2
Schramm, K.3
Paar, C.4
-
27
-
-
33744907692
-
Low-cost RFID systems: Confronting security and privacy
-
1Zurich, Switzerland, September
-
Ranasinghe, D.; Engels, D.; and Cole, P. Low-cost RFID systems: Confronting security and privacy. Auto-ID Labs Research Workshop, Zurich, Switzerland, September 2004.
-
(2004)
Auto-ID Labs Research Workshop
-
-
Ranasinghe, D.1
Engels, D.2
Cole, P.3
-
28
-
-
0004448836
-
-
PKCS#1v2.1: RSA cryptography standard. Draft, Redford, MA, January 5
-
RSA Data Security. PKCS#1v2.1: RSA cryptography standard. Draft, Redford, MA, January 5, 2001. Available at ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2- 1.pdf.
-
(2001)
RSA Data Security
-
-
-
29
-
-
37349006240
-
RFID opportunities for mobile telecommunication services
-
ITU-T Lighthouse, May
-
Seidler, C. RFID opportunities for mobile telecommunication services. Technical paper, ITU-T Lighthouse, May 2005. Available at www.itu.int/ITU-T/ techwatch/rfid.pdf.
-
(2005)
Technical Paper
-
-
Seidler, C.1
-
30
-
-
70450162483
-
A new RFID authentication protocol with ownership transfer in an insecure communication environment
-
Shenyang, China, August 12-14 IEEE Computer Society Press, Washington, DC
-
Wang, C.H.; and Chin, S. A new RFID authentication protocol with ownership transfer in an insecure communication environment. In Proceedings of the Ninth International Conference on Hybrid Intelligent Systems, Shenyang, China, August 12-14, 2009, IEEE Computer Society Press, Washington, DC, 486-491.
-
(2009)
Proceedings of the Ninth International Conference on Hybrid Intelligent Systems
, pp. 486-491
-
-
Wang . C, H.1
Chin, S.2
-
31
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S. Weis, S. Sarma, R. Rivest, and D. Engels Security and privacy aspects of low-cost radio frequency identification systems Security in Pervasive Computing 2802 2004 201 212
-
(2004)
Security in Pervasive Computing
, vol.2802
, pp. 201-212
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
32
-
-
42549100734
-
Computation-efficient multicast key distribution
-
DOI 10.1109/TPDS.2007.70759
-
L. Xu, and C. Huang Computation-efficient multicast key distribution IEEE Transactions on Parallel and Distributed Systems 19 5 2008 577 586 (Pubitemid 351583563)
-
(2008)
IEEE Transactions on Parallel and Distributed Systems
, vol.19
, Issue.5
, pp. 577-586
-
-
Xu, L.1
Huang, C.2
-
34
-
-
80052606920
-
Mobile RFID mutual authentication and ownership transfer
-
January 23-28 St. Maarten, Netherlands Antilles
-
Yang, M. H.; and Luo, J. N. Mobile RFID mutual authentication and ownership transfer. In Proceedings of the Sixth International Conference on System Sciences, January 23-28, 2011, St. Maarten, Netherlands Antilles, 88-94.
-
(2011)
Proceedings of the Sixth International Conference on System Sciences
, pp. 88-94
-
-
Yang . M, H.1
Luo, J.N.2
-
35
-
-
80052605658
-
Mobile RFID ownership transfer across different authorities
-
Taipei, Taiwan, November
-
Yang, M. H.; and Tsai, T. C. Mobile RFID ownership transfer across different authorities. In 2009 National Computer Symposium, Taipei, Taiwan, November 2009, 508-519.
-
(2009)
2009 National Computer Symposium
, pp. 508-519
-
-
Yang . M, H.1
Tsai, T.C.2
-
36
-
-
57949109349
-
Two security problems of RFID security method with ownership transfer
-
October 18-21 IEEE Computer Society Press, Washington, DC
-
Yoon, E. J.; and Yoo, K. Y. Two security problems of RFID security method with ownership transfer. In Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing, October 18-21, 2008, IEEE Computer Society Press, Washington, DC, 68-73.
-
(2008)
Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
, pp. 68-73
-
-
Yoon . E, J.1
Yoo, K.Y.2
-
37
-
-
77951764163
-
Changing hands together: A secure group ownership transfer protocol for RFID tags
-
R. Sprague (ed.) Kauai, HI, January 2010, IEEE Computer Society Press, Washington, DC
-
Zuo, Y. J. Changing hands together: a secure group ownership transfer protocol for RFID tags. In R. Sprague (ed.), Proceedings of the 43th Hawaii International Conference on System Sciences, Kauai, HI, January 2010, IEEE Computer Society Press, Washington, DC.
-
Proceedings of the 43th Hawaii International Conference on System Sciences
-
-
Zuo, Y.J.1
|