-
1
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
S. Garfinkel, A. Jules and R. Pappu, "RFID privacy: an overview of problems and proposed solutions," IEEE Security and Privacy. 3(3): 34-43, May/June 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
-
-
Garfinkel, S.1
Jules, A.2
Pappu, R.3
-
3
-
-
84855195246
-
-
Web site, Referenced 2005 at
-
EPCglobal Web site, 2005. Referenced 2005 at http://www.EPCglobalinc.org.
-
(2005)
-
-
-
4
-
-
24944582157
-
Efficient Authentication for Low-Cost RFID systems
-
ICCSA05, Springer-Verlag
-
S.M. Lee, Y.J. Hwang, D.H. Lee and J.I. Lim, "Efficient Authentication for Low-Cost RFID systems," ICCSA05, vol. 3480 LNCS, pp.619-629, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3480
, pp. 619-629
-
-
Lee, S.M.1
Hwang, Y.J.2
Lee, D.H.3
Lim, J.I.4
-
5
-
-
32844471136
-
An Introduction to RFID Technology
-
R. Want,"An Introduction to RFID Technology," IEEE Pervasive Computing, vol. 5, pp. 25-33, 2005.
-
(2005)
IEEE Pervasive Computing
, vol.5
, pp. 25-33
-
-
Want, R.1
-
6
-
-
70349294033
-
WinRFID - A Middleware for the enablement of Radio Frequency Identification (RFID) based Applications
-
420 Westwood Pl., Los Angeles CA 90095
-
B. S. Prabhu, X. Su, H. Ramamurthy, C. Chu and R. Gadh, "WinRFID - A Middleware for the enablement of Radio Frequency Identification (RFID) based Applications," UCLA - Wireless Internet for the Mobile Enterprise Consortium (WINMEC)420 Westwood Pl., Los Angeles CA 90095.
-
UCLA - Wireless Internet for the Mobile Enterprise Consortium (WINMEC)
-
-
Prabhu, B.S.1
Su, X.2
Ramamurthy, H.3
Chu, C.4
Gadh, R.5
-
7
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
R. Sandhu and R. Thomas, editors, Orlando, Florida, USA, March IEEE Computer Society
-
D. Henrici and P. Muller, "Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers," In R. Sandhu and R. Thomas, editors, International Workshop on Pervasive Computing and Communication Security -PerSec 2004, pages 149-153, Orlando, Florida, USA, March 2004. IEEE Computer Society.
-
(2004)
International Workshop on Pervasive Computing and Communication Security -PerSec 2004
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
8
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
B. Pfitzmann and P. Liu, editors, Washington, DC, USA, October ACM Press
-
D. Molnar and D. Wagner, "Privacy and security in library RFID: Issues, practices, and architectures," In B. Pfitzmann and P. Liu, editors, Conference on Computer and Communications Security - ACM CCS, pages 210-219, Washington, DC, USA, October 2004. ACM Press.
-
(2004)
Conference on Computer and Communications Security - ACM CCS
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
9
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
-
K. Rhee, J. Kwak, S. Kim and D. Won, "Challenge-Response Based RFID Authentication Protocol for Distributed Database Environmnet,"SPC 2005, LNCS 3450, pp. 70-84, 2005. (Pubitemid 41274193)
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
10
-
-
33744940544
-
Efficient RFID authentication protocol for ubiquitous computing environment
-
Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings
-
E.Y. Choi, S.M. Lee and D.H. Lee, "Efficient RFID Authentication Protocol for Ubiquitous Computing Environment," Embedded and Ubiquitous Computing, vol.3832, pp.945-954, 2005. (Pubitemid 43848772)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3823 LNCS
, pp. 945-954
-
-
Choi, E.Y.1
Lee, S.M.2
Lee, D.H.3
-
11
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
-
DOI 10.1016/j.csi.2006.04.004, PII S092054890600064X
-
H. Chien and C. Chen, "Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards," Computer Standards & Interfaces, 29(2):254-259, February 2007. (Pubitemid 44829930)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
12
-
-
24944575863
-
Cryptographic approach to "privacy-friendly" tags
-
M. Ohkubo, K. Suzki and S. Kinoshita, "Cryptographic approach to "privacy-friendly" tags.," In RFID Privacy Workshop, MIT, MA, USA, November 2003. http://www.rfidprivacy.us/2003/agenda.php.
-
RFID Privacy Workshop, MIT, MA, USA, November 2003
-
-
Ohkubo, M.1
Suzki, K.2
Kinoshita, S.3
-
13
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
Athens, Greece, September IEEE
-
T. Dimitriou, "A lightweight RFID protocol to protect against traceability and cloning attacks," In Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm, pages 59-66, Athens, Greece, September 2005. IEEE.
-
(2005)
Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm
, pp. 59-66
-
-
Dimitriou, T.1
-
14
-
-
72949093749
-
Supporting Recovery, Privacy and Security in RFID Systems Using A Robust Authentication Protocol
-
M.E. Hoque,F. Rahman and S.I. Ahamed, "Supporting Recovery, Privacy and Security in RFID Systems Using A Robust Authentication Protocol," Proceedings of the 2009 ACM symposium on Applied Computing, SAC'09, Honlulu, Hawaii,USA. pp.1062-1066.
-
Proceedings of the 2009 ACM Symposium on Applied Computing, SAC'09, Honlulu, Hawaii,USA
, pp. 1062-1066
-
-
Hoque, M.E.1
Rahman, F.2
Ahamed, S.I.3
-
15
-
-
38549103545
-
Security analysis and enhancement of One-way Hash based Low-Cost Authentication Protocol (OHLCAP)
-
Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers
-
Ha, J, Moon, S, Nieto, JMG and Boyd, C "Security Analysis and Enhancement of One-Way Hash Based Low- Cost Authentication Protocol", Emerging Technologies in Knowledge Discovery and Data Mining, vol.4819, pp.574-583, 2007. (Pubitemid 351153026)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4819 LNAI
, pp. 574-583
-
-
Ha, J.1
Moon, S.2
Nieto, J.M.G.3
Boyd, C.4
-
16
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
B. Song and C. J. Mitchell, "RFID authentication protocol for low-cost tags," In WISEC, pages 140-147, 2008.
-
(2008)
WISEC
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
18
-
-
70349284581
-
Secure human identification protocols, Advances in Cryptology - ASYACRYPT'2001
-
Springer
-
N.J. Hopper and M. Blum, Secure human identification protocols, Advances in Cryptology - ASYACRYPT'2001, Lecture Notes in Computer Science, vol. 2248, Springer, 2001, pp.52-66.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
19
-
-
33745181952
-
Authenticating Pervasive Devices with Human Protocols
-
Proceedings of CRYPTO'05, Victor Shoup (Ed.), Springer- Verlag
-
A. Juels and S. Weis, Authenticating Pervasive Devices with Human Protocols, Proceedings of CRYPTO'05, Victor Shoup (Ed.), Springer- Verlag, LNCS 3261, pp. 293-308, 2005.
-
(2005)
LNCS
, vol.3261
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
22
-
-
33845920117
-
HB++: A lightweight authentication protocol secure against some attacks
-
J. Bringer, H. Chabanne and E. Dottax, HB++: a lightweight authentication protocol secure against some attacks, in: IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in pervasive and Ubiquitous Computing - SecPerU, 2006.
-
IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, 2006
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
23
-
-
36249031858
-
HB and related lightweight authentication protocols for secure RFID tag/reader authentication
-
S. Piramuthu, HB and related lightweight authentication protocols for secure RFID tag/reader authentication, in: CollECTeR Europe Conference, Basel, Switzerland, 9-10 June, 2006.
-
CollECTeR Europe Conference, Basel, Switzerland, 9-10 June, 2006
-
-
Piramuthu, S.1
-
24
-
-
34247523203
-
HB-MP: A further step in the HB-family of lightweight authentication protocols
-
2007
-
J. Munilla and A. Peinado, HB-MP: A further step in the HB-family of lightweight authentication protocols, Computer Netwroks 51 (2007), p.2262-2267, 2007.
-
(2007)
Computer Netwroks
, vol.51
, pp. 2262-2267
-
-
Munilla, J.1
Peinado, A.2
-
26
-
-
38149050502
-
A family of dunces: Trivial RFID identification and authentication protocols
-
N. Borisov and P. Golle, editors, Privacy Enhancing Technologies, 7th International Symposium - PET 2007, Ottawa, Canada, June Springer-Verlag, Berlin
-
G. Tsudik, A family of dunces: Trivial RFID identification and authentication protocols. In N. Borisov and P. Golle, editors, Privacy Enhancing Technologies, 7th International Symposium - PET 2007, volume 4776 of Lecture Notes in Computer Science, pages 45-61, Ottawa, Canada, June 2007. Springer-Verlag, Berlin.
-
(2007)
Lecture Notes in Computer Science
, vol.4776
, pp. 45-61
-
-
Tsudik, G.1
|