-
2
-
-
0003449736
-
Survivable network systems: An emerging discipline
-
Carnegie Mellon Univ.
-
R. Ellison, D. Fisher, R. Linger, and H. Lipson, "Survivable Network Systems: An Emerging Discipline," Tech. Rep. CMU/SEI-97-TR-013, Software Eng. Inst., Carnegie Mellon Univ., 1997.
-
(1997)
Tech. Rep. CMU/SEI-97-TR-013, Software Eng. Inst.
-
-
Ellison, R.1
Fisher, D.2
Linger, R.3
Lipson, H.4
-
4
-
-
33748108997
-
Dependability through assured reconfiguration in embedded system software
-
DOI 10.1109/TDSC.2006.33, 1673378
-
E. Strunk and J. Knight, "Dependability Through Assured Reconfiguration in Embedded Systems Software," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 3, pp. 172-187, July 2006. (Pubitemid 44304206)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.3
, pp. 172-187
-
-
Strunk, E.A.1
Knight, J.C.2
-
5
-
-
0034228685
-
Reliability and survivability of wireless and mobile networks
-
July
-
A. Snow, U. Varshney, and A. Malloy, "Reliability and Survivability of Wireless and Mobile Networks," Computer, vol. 33, no. 7, pp. 49-55, July 2000.
-
(2000)
Computer
, vol.33
, Issue.7
, pp. 49-55
-
-
Snow, A.1
Varshney, U.2
Malloy, A.3
-
6
-
-
33845429016
-
A case against currently used hash functions in RFID protocols
-
On the Move to Meaningful Internet Syst. 2006: OTM 2006 Workshops - OTM Confed. Int. Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerS
-
M. Feldhofer and C. Rechberger, "A Case against Currently Used Hash Functions in RFID Protocols," On the Move to Meaningful Internet Systems 2006: Proc. OTM 2006 Workshops, LNCS, vol. 4277, pp. 372-381, 2006. (Pubitemid 44891826)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4277
, pp. 372-381
-
-
Feldhofer, M.1
Rechberger, C.2
-
7
-
-
77953693368
-
An elliptic curve processor suitable for RFID-tags
-
Aug.
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "An Elliptic Curve Processor Suitable for RFID-Tags," IEEE Trans. Computers, vol. 57, no. 11, pp. 1514-1527, Aug. 2008.
-
(2008)
IEEE Trans. Computers
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
8
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels, "RFID Security and Privacy: A Research Survey," IEEE J. Selected Areas Comm., vol. 24, no. 2, pp. 381-394, Feb. 2006. (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
9
-
-
33947538532
-
Protocols for RFID tag/reader authentication
-
DOI 10.1016/j.dss.2007.01.003, PII S0167923607000103, Integrated Decision Support
-
S. Piramuthu, "Protocols for RFID Tag/Reader Authentication," Decision Support System, vol. 43, pp. 897-914, 2007. (Pubitemid 46466997)
-
(2007)
Decision Support Systems
, vol.43
, Issue.3
, pp. 897-914
-
-
Piramuthu, S.1
-
10
-
-
84977783611
-
Strong and robust RFID authentication enabling perfect ownership transfer
-
Dec.
-
C. Lim and T. Kwon, "Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer," Proc. Eighth Conf. Information Comm. Security, pp. 1-20, Dec. 2006.
-
(2006)
Proc. Eighth Conf. Information Comm. Security
, pp. 1-20
-
-
Lim, C.1
Kwon, T.2
-
11
-
-
70349284581
-
Secure Human Identification Protocols
-
Advances in Cryptology - ASIACRYPT 2001
-
N. Hopper and M. Blum, "Secure Human Identification Protocols," Proc. Conf. Advances in Cryptology - ASIA CRYPT 2001, vol. 2248, C. Boyd ed., pp. 52-66, 2001. (Pubitemid 33371178)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
12
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
V. Shoup ed.
-
A. Juels and S. Weis, "Authenticating Pervasive Devices with Human Protocols," Proc. Advances in Cryptology-Crypto 05, V. Shoup ed., pp. 293-308, 2005.
-
(2005)
Proc. Advances in Cryptology-crypto 05
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
13
-
-
33746104831
-
Parallel and concurrent security of the HB and HB++ protocols
-
Springer
-
J. Katz and J. Shin, "Parallel and Concurrent Security of the HB and HB++ Protocols," Advances in Cryptology - EURO CRYPT 2006, vol. 4004, pp. 73-87, Springer, 2006.
-
(2006)
Advances in Cryptology - EURO CRYPT 2006
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.2
-
15
-
-
26444435642
-
RFID guardian: A battery-powered mobile device for RFID privacy management
-
Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
-
M. Rieback, B. Crispo, and A. Tanenbaum, "RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management," Proc. Australian Conf. Information Security Privacy, vol. 3574, pp. 184-194, July 2005. (Pubitemid 41431781)
-
(2005)
Lecture Notes in Computer Science
, vol.3574
, pp. 184-194
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
16
-
-
33746092119
-
High-power proxies for enhancing RFID privacy and utility
-
DOI 10.1007/11767831-14, Privacy Enhancing Technologies - 5th International Workshop, PET 2005, Revised Selected Papers
-
A. Juels, P. Syverson, and D. Bailey, "High-Power Proxies for Enhancing RFID Privacy and Utility," Proc. Workshop Privacy Enhancing Technology (PET), pp. 210-226, May/June 2005. (Pubitemid 44071842)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3856
, pp. 210-226
-
-
Juels, A.1
Syverson, P.2
Bailey, D.3
-
17
-
-
34547687590
-
Defining strong privacy for RFID
-
DOI 10.1109/PERCOMW.2007.37, 4144854, Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
-
A. Juels and S. Weis, "Defining Strong Privacy for RFID," Proc. Fifth IEEE Int'l Conf. Pervasive Computing and Comm. Workshops, pp. 342-347, Mar. 2007. (Pubitemid 47214235)
-
(2007)
Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
18
-
-
0020720357
-
On the security of public key protocols
-
Mar.
-
D. Dolev and A. C. Yao, "On the security of public key protocols" IEEE Trans. Information Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
-
(1983)
IEEE Trans. Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
19
-
-
85070912494
-
Attack-potential-based survivability modeling for high-consequence systems
-
Mar.
-
J. McDermott, "Attack-Potential-Based Survivability Modeling for High-Consequence Systems," Proc. Third IEEE Int'l Information Assurance Workshop, pp. 119-130, Mar. 2005.
-
(2005)
Proc. Third IEEE Int'l Information Assurance Workshop
, pp. 119-130
-
-
McDermott, J.1
-
20
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
E. Jonsson and T. Olovssson, "A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior," IEEE Trans. Software Eng., vol. 23, no. 4, pp. 235-245, Apr. 1997. (Pubitemid 127828291)
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
22
-
-
0034593315
-
Adversary work factor as a metric for information assurance
-
G. Schudel and B. Wood, "Adversary Work Factor as a Metric for Information Assurance," Proc. Workshop New Security Paradigms, pp. 23-30, 2001.
-
(2001)
Proc. Workshop New Security Paradigms
, pp. 23-30
-
-
Schudel, G.1
Wood, B.2
-
24
-
-
50249164439
-
A secure RFID identity reporting protocol for physical attack resistance
-
July
-
Z. Liu and D. Peng, "A Secure RFID Identity Reporting Protocol for Physical Attack Resistance," J. Comm., vol. 1, p. 4, July 2006.
-
(2006)
J. Comm.
, vol.1
, pp. 4
-
-
Liu, Z.1
Peng, D.2
-
25
-
-
31344454443
-
On a new way to read data from memory
-
D. Samyde, S. Skorobogatov, R. Anderson, and J. Quisquater, "On a New Way to Read Data from Memory," Proc. First Int'l IEEE Security Storage Workshop, p. 65, 2002.
-
(2002)
Proc. First Int'l IEEE Security Storage Workshop
, pp. 65
-
-
Samyde, D.1
Skorobogatov, S.2
Anderson, R.3
Quisquater, J.4
-
28
-
-
84878934912
-
A framework for RFID survivability requirement analysis and specification
-
Y. Zuo, M. Pimple, and S. Lande, "A Framework for RFID Survivability Requirement Analysis and Specification," Proc. Int'l Joint Conf. Computing, Information and Systems Sciences and Engineering, pp. 153-159, 2009.
-
(2009)
Proc. Int'l Joint Conf. Computing, Information and Systems Sciences and Engineering
, pp. 153-159
-
-
Zuo, Y.1
Pimple, M.2
Lande, S.3
-
29
-
-
84856242538
-
A holistic approach for specification of security requirements in ubiquitous computing
-
Y. Zuo, "A Holistic Approach for Specification of Security Requirements in Ubiquitous Computing," Proc. Int'l Conf. Information Systems (ICIS'10) p. 18, 2010.
-
(2010)
Proc. Int'l Conf. Information Systems (ICIS'10)
, pp. 18
-
-
Zuo, Y.1
|