-
2
-
-
80052909376
-
RFID Technical Tutorial and Threat Modeling, Ver.1.0
-
Dec.
-
R. Chaudhry, D.R. Thompson, and C. Thompson, "RFID Technical Tutorial and Threat Modeling, Ver.1.0," technical report, Dept. of Computer Science and Computer Eng., Univ. of Arkansas, http://comp.uark.edu/~drt, Dec. 2005.
-
(2005)
1technical Report, Dept. of Computer Science and Computer Eng., Univ. of Arkansas
-
-
Chaudhry, R.1
Thompson, D.R.2
Thompson, C.3
-
3
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels, "RFID security and Privacy: A Research Survey," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 381-394, Feb. 2006. (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
5
-
-
33144462296
-
Hacking the prox card
-
S. Garfinkel and B. Rosenberg, eds. Addison-Wesley
-
J. Westhues, "Hacking the Prox Card," RFID: Applications, Security, and Privacy, S. Garfinkel and B. Rosenberg, eds., pp. 291-300, Addison-Wesley, 2005.
-
(2005)
RFID: Applications, Security, and Privacy
, pp. 291-300
-
-
Westhues, J.1
-
6
-
-
52949116081
-
A practical attack on the MIFARE classic
-
G.D. Koning Gans, J. Hoepman, and F.D. Garcia, "A Practical Attack on the MIFARE Classic," Proc. Eighth IFIP WG 8.8/11.2 Int'l Conf. Smart Card Research and Advanced Appl. (CARDIS '08), pp. 267-282, 2008.
-
(2008)
Proc. Eighth IFIP WG 8.8/11.2 Int'l Conf. Smart Card Research and Advanced Appl. (CARDIS '08)
, pp. 267-282
-
-
Koning Gans, G.D.1
Hoepman, J.2
Garcia, F.D.3
-
7
-
-
34548285839
-
Remote password extraction from RFID tags
-
DOI 10.1109/TC.2007.1050, Emergent Systems, Algorithms, and Architectures for Speech-Based Human Machine Interaction
-
Y. Oren and A. Shamir, "Remote Password Extraction from RFID Tags," IEEE Trans. Computers, vol. 56, no. 9, pp. 1292-1296, Sept. 2007. (Pubitemid 47322909)
-
(2007)
IEEE Transactions on Computers
, vol.56
, Issue.9
, pp. 1292-1296
-
-
Oren, Y.1
Shamir, A.2
-
8
-
-
38049074796
-
Power and em Attacks on Passive 13.56 MHz RFID Devices
-
M. Hutter, S. Mangard, and M. Feldhofer, "Power and EM Attacks on Passive 13.56 MHz RFID Devices," Proc. Ninth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '07), pp. 320-333, 2007.
-
(2007)
Proc. Ninth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '07)
, pp. 320-333
-
-
Hutter, M.1
Mangard, S.2
Feldhofer, M.3
-
10
-
-
36248949547
-
Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning
-
D.N. Duc, J. Park, H. Lee, and K. Kim, "Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning," Proc. 2006 Symp. Cryptography and Information Security, 2006.
-
(2006)
Proc. 2006 Symp. Cryptography and Information Security
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
12
-
-
34548815120
-
Are standards compliant elliptic curve cryptosystems feasible on RFID?
-
July
-
S.S. Kumar and C. Paar, "Are Standards Compliant Elliptic Curve Cryptosystems Feasible on RFID?" Proc. Workshop RFID Security, July 2006.
-
(2006)
Proc. Workshop RFID Security
-
-
Kumar, S.S.1
Paar, C.2
-
13
-
-
49049105964
-
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication protocol
-
Y.K. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol," IEEE Int'l Conf. RFID, pp. 97-104, 2008.
-
(2008)
IEEE Int'l Conf. RFID
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
15
-
-
77952345634
-
Robust, Anonymous RFID authentication with constant key-lookup
-
M. Burmester, B. de Medeiros, and R. Motta, "Robust, Anonymous RFID Authentication with Constant Key-Lookup," Proc. 2008 ACM Symp. Information, Computer and Comm. Security (ASIACCS '08), pp. 283-291, 2008.
-
(2008)
Proc. 2008 ACM Symp. Information, Computer and Comm. Security (ASIACCS '08)
, pp. 283-291
-
-
Burmester, M.1
De Medeiros, B.2
Motta, R.3
-
16
-
-
26444478592
-
RFID traceability: A multilayer problem
-
Finacial Cryptography and Data Security: 9th International Conference, FC 2005. Revised Papers
-
G. Avoine and P. Oechslin, "RFID Traceability: A Multilayer Problem," Proc. Financial Cryptography (FC '05), pp. 125-140, 2005. (Pubitemid 41425471)
-
(2005)
Lecture Notes in Computer Science
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
17
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo, "Security Analysis of a Cryptographically-Enabled RFID Device," Proc. USENIX Security Symp., pp. 1-16, 2005.
-
(2005)
Proc. USENIX Security Symp.
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
18
-
-
38049016161
-
Electromagnetic side channel analysis of a contactless smart card: First results
-
July
-
D. Carluccio, K. Lemke, and C. Paar, "Electromagnetic Side Channel Analysis of a Contactless Smart Card: First Results," Proc. ECRYPT Workshop RFID and Lightweight Crypto, pp. 44-51, July 2005.
-
(2005)
Proc. ECRYPT Workshop RFID and Lightweight Crypto
, pp. 44-51
-
-
Carluccio, D.1
Lemke, K.2
Paar, C.3
-
22
-
-
0347227352
-
-
NIST/SEMATECH e-Handbook of Statistical Methods
-
NIST/SEMATECH e-Handbook of Statistical Methods. Nat'l Inst. of Standards and Technology, http://www.itl.nist.gov/div898/handbook, 2007.
-
(2007)
Nat'l Inst. of Standards and Technology
-
-
-
24
-
-
24344507334
-
Remote physical device fingerprinting
-
DOI 10.1109/TDSC.2005.26
-
T. Kohno, A. Broido, and K.C. Claffy, "Remote Physical Device Fingerprinting," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 2, pp. 93-108, Apr. 2005. (Pubitemid 41259859)
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
25
-
-
1542487484
-
Cellular security: Better, but foes still lurk
-
June
-
M.J. Riezenman, "Cellular Security: Better, but Foes Still Lurk," IEEE Spectrum, vol. 37, no. 6, pp. 39-42, June 2000.
-
(2000)
IEEE Spectrum
, vol.37
, Issue.6
, pp. 39-42
-
-
Riezenman, M.J.1
-
27
-
-
85180626613
-
Device identification via analog signal fingerprinting: A matched filter approach
-
Feb.
-
R. Gerdes, T.E. Daniels, M. Mina, and S. Russell, "Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach," Proc. 13th Ann. Network and Distributed System Security Symp., Feb. 2006.
-
(2006)
Proc. 13th Ann. Network and Distributed System Security Symp.
-
-
Gerdes, R.1
Daniels, T.E.2
Mina, M.3
Russell, S.4
-
28
-
-
50249134033
-
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
-
D.E. Holcomb, W.P. Burleson, and K. Fu, "Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags," Proc. Conf. RFID Security, 2007.
-
(2007)
Proc. Conf. RFID Security
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
29
-
-
67649259238
-
Electromagnetic measurements for counterfeit detection of radio frequency identification cards
-
May
-
H.P. Romero, K.A. Remley, D.F. Williams, and C.-M. Wang, "Electromagnetic Measurements for Counterfeit Detection of Radio Frequency Identification Cards," IEEE Trans. Microwave Theory and Techniques, vol. 57, no. 5, pp. 1383-1387, May 2009.
-
(2009)
IEEE Trans. Microwave Theory and Techniques
, vol.57
, Issue.5
, pp. 1383-1387
-
-
Romero, H.P.1
Remley, K.A.2
Williams, D.F.3
Wang, C.-M.4
-
31
-
-
80052914438
-
-
Voyantic Ltd
-
Voyantic Ltd., http://www.voyantic.com, 2010.
-
(2010)
-
-
-
33
-
-
0025725905
-
Instance-based learning algorithms
-
DOI 10.1023/A:1022689900470
-
D.W. Aha, D. Kibler, and M.K. Albert, "Instance-Based Learning Algorithms," Machine Learning, vol. 6, pp. 37-66, 1991. (Pubitemid 21727227)
-
(1991)
Machine Learning
, vol.6
, Issue.1
, pp. 37-66
-
-
Aha David, W.1
Kibler Dennis2
Albert Marc, K.3
|