-
2
-
-
84856811705
-
-
Avoine, G.: (2010), http://www.avoine.net/rfid/
-
(2010)
-
-
Avoine, G.1
-
3
-
-
33746342177
-
Towards provable security for ubiquitous applications
-
DOI 10.1007/11780656-25, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings
-
Burmester, M., Van Le, T., de Medeiros, B.: Towards provable security for ubiquitous applications. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 295-312. Springer, Heidelberg (2006) (Pubitemid 44113018)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4058 LNCS
, pp. 295-312
-
-
Burmester, M.1
Van Le, T.2
De Medeiros, B.3
-
5
-
-
33645989981
-
Improvement of the edit distance attack to clock-controlled LFSR-based stream ciphers
-
Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2005. Springer, Heidelberg
-
Caballero-Gil, P., Fúster-Sabater, A.: Improvement of the edit distance attack to clock-controlled LFSR-based stream ciphers. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2005. LNCS, vol. 3643, pp. 355-364. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3643
, pp. 355-364
-
-
Caballero-Gil, P.1
Fúster-Sabater, A.2
-
6
-
-
70350572865
-
Conformation of EPC Class 1 Generation 2 Standards RFID System with Mutual Authentication and Privacy Protection
-
Chen, C.L., Deng, Y.Y.: Conformation of EPC Class 1 Generation 2 Standards RFID System with Mutual Authentication and Privacy Protection. Engineering Applications of Artificial Intelligence (2009)
-
(2009)
Engineering Applications of Artificial Intelligence
-
-
Chen, C.L.1
Deng, Y.Y.2
-
8
-
-
33751546328
-
Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards
-
Elsevier, Amsterdam
-
Chien, H.Y., Chen, C.H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. In: Computer Standards and Interfaces, vol. 29. Elsevier, Amsterdam (2007)
-
(2007)
Computer Standards and Interfaces
, vol.29
-
-
Chien, H.Y.1
Chen, C.H.2
-
9
-
-
68949181328
-
Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID system
-
Choi, E.Y., Lee, D.H., Lim, J.I.: Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID system. Computer Standards & Interfaces 31(6) (2009)
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.6
-
-
Choi, E.Y.1
Lee, D.H.2
Lim, J.I.3
-
13
-
-
68949181328
-
Anti-cloning protocol suitable to epcglobal class-1 generation-2 rfid systems
-
Eun Young Choi, D.H.L., Lim, J.I.: Anti-cloning protocol suitable to epcglobal class-1 generation-2 rfid systems. Computer Standards & Interfaces 31(6), 1124-1130 (2009)
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.6
, pp. 1124-1130
-
-
Eun Young Choi, D.H.L.1
Lim, J.I.2
-
14
-
-
34548658010
-
Linear solutions for cryptographic nonlinear sequence generators
-
Fúster-Sabater, A., Caballero-Gil, P.: Linear solutions for cryptographic nonlinear sequence generators. Physics Letters A 369(5-6), 432-437 (2007)
-
(2007)
Physics Letters A
, vol.369
, Issue.5-6
, pp. 432-437
-
-
Fúster-Sabater, A.1
Caballero-Gil, P.2
-
15
-
-
77954299443
-
Effective and Efficient Event Dissemination for RFID Applications
-
Jin, B., Zhao, X., Long, Z., Qi, F., Yu, S.: Effective and Efficient Event Dissemination for RFID Applications. The Computer Journal 52(8) (2009)
-
(2009)
The Computer Journal
, vol.52
, Issue.8
-
-
Jin, B.1
Zhao, X.2
Long, Z.3
Qi, F.4
Yu, S.5
-
18
-
-
72849133459
-
-
Koscher, K., Juels, A., Kohno, T., Brajkovic, V.: EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond (2008)
-
(2008)
EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond
-
-
Koscher, K.1
Juels, A.2
Kohno, T.3
Brajkovic, V.4
-
19
-
-
67650330575
-
Securing RFID systems by detecting tag cloning
-
Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. Springer, Heidelberg
-
Lehtonen, M., Ostojic, D., Ilic, A., Michahelles, F.: Securing RFID systems by detecting tag cloning. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 291-308. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5538
, pp. 291-308
-
-
Lehtonen, M.1
Ostojic, D.2
Ilic, A.3
Michahelles, F.4
-
20
-
-
38949171391
-
Security and privacy on authentication protocol for low-cost RFID
-
Li, Y.Z., Cho, Y.B., Um, N.K., Lee, S.H.: Security and privacy on authentication protocol for low-cost RFID. In: IEEE International Conference on Computational Intelligence and Security (2006)
-
IEEE International Conference on Computational Intelligence and Security (2006)
-
-
Li, Y.Z.1
Cho, Y.B.2
Um, N.K.3
Lee, S.H.4
-
21
-
-
84856825503
-
RFID Authentication Protocol for Low-cost Tags
-
Song, B., Mitchell, C.J.: RFID Authentication Protocol for Low-cost Tags. In: WiSec 2008, Alexandria, Virginia, USA (2008)
-
WiSec 2008, Alexandria, Virginia, USA (2008)
-
-
Song, B.1
Mitchell, C.J.2
|