-
1
-
-
77954695258
-
Lightweight privacy preserving authentication for rfid using a stream cipher
-
O. Billet, J. Etrog, and H. Gilbert, "Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher", FSE 2010, ser. LNCS 6147, pp. 55-74, 2010.
-
(2010)
FSE 2010, Ser. LNCS 6147
, pp. 55-74
-
-
Billet, O.1
Etrog, J.2
Gilbert, H.3
-
2
-
-
36248982045
-
SASI: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity
-
October-December
-
H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 337-340, October-December 2007.
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
3
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
T. Dimitriou, "A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks", SecureComm'05, pp. 59-66, 2005.
-
(2005)
SecureComm'05
, pp. 59-66
-
-
Dimitriou, T.1
-
4
-
-
84858398387
-
Ultra-lightweight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol
-
D. Engels, X. Fan, G. Gong, H. Hu, and E. M. Smith, "Ultra- Lightweight Cryptography for Low-Cost RFID Tags: Hummingbird Algorithm and Protocol", CACR 2009-29, available at http://www.cacr.math.uwaterloo. ca/techreports/2009/cacr2009-29.pdf.
-
CACR 2009-29
-
-
Engels, D.1
Fan, X.2
Gong, G.3
Hu, H.4
Smith, E.M.5
-
5
-
-
77956140198
-
Hummingbird: Ultra-lightweight cryptography for resource-constrained devices
-
D. Engels, X. Fan, G. Gong, H. Hu, and E. M. Smith, "Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices", FC 2010 Workshops, ser. LNCS 6054, pp. 3-18, 2010.
-
(2010)
FC 2010 Workshops, Ser. LNCS 6054
, pp. 3-18
-
-
Engels, D.1
Fan, X.2
Gong, G.3
Hu, H.4
Smith, E.M.5
-
6
-
-
84864194805
-
The hummingbird-2 lightweight authenticated encryption algorithm
-
D. Engels, M.-J. O. Saarinen, and E. M. Smith, "The Hummingbird-2 Lightweight Authenticated Encryption Algorithm", RFIDSec 2011, 2011.
-
(2011)
RFIDSec 2011
-
-
Engels, D.1
Saarinen, M.-J.O.2
Smith, E.M.3
-
7
-
-
84858419642
-
-
EPCglobal, Inc., http://www.epcglobalinc.org/home/, 2010.
-
(2010)
-
-
-
8
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using variable identifiers
-
A. Henrici and P. Müller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Variable Identifiers", PerSec'04, pp. 149-153, 2004.
-
(2004)
PerSec'04
, pp. 149-153
-
-
Henrici, A.1
Müller, P.2
-
9
-
-
33144457479
-
RFID security and privacy: A research survey
-
February
-
A. Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal on Selected Areas in Communications (J-SAC), vol. 24, no. 2, pp. 381-394, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications (J-SAC)
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
10
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures", CCS'04, pp. 210-219, 2004.
-
(2004)
CCS'04
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
11
-
-
24944575863
-
Cryptographic approach to privacy-friendly tags
-
MIT, MA, USA
-
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographic Approach to Privacy-Friendly Tags", RFID Privacy Workshop, MIT, MA, USA, 2003. Available at http://www.rfidprivacy.us/2003/papers/ohkubo.pdf.
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
12
-
-
78751694609
-
Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling
-
December
-
B. Ransford, S. Clark, M. Salajegheh, and K. Fu, "Getting Things Done on Computational RFIDs with Energy-Aware Checkpointing and Voltage-Aware Scheduling", HotPower'08, December 2008.
-
(2008)
HotPower'08
-
-
Ransford, B.1
Clark, S.2
Salajegheh, M.3
Fu, K.4
-
14
-
-
84858390549
-
Design of a passively-powered, programmable sensing platform for UHF RFID systems
-
A. Sample, D. Yeager, P. Powledge, and J. Smith, "Design of a Passively-Powered, Programmable Sensing Platform for UHF RFID Systems", IEEE RFID 2007, pp. 149-156, 2007.
-
(2007)
IEEE RFID
, vol.2007
, pp. 149-156
-
-
Sample, A.1
Yeager, D.2
Powledge, P.3
Smith, J.4
-
15
-
-
67650080154
-
Server impersonation attacks on RFID protocols
-
B. Song, "Server Impersonation Attacks on RFID Protocols", UBICOMM' 08, pp. 50-55, 2008.
-
(2008)
UBICOMM' 08
, pp. 50-55
-
-
Song, B.1
-
16
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
B. Song, and C.J. Mitchell, "RFID Authentication Protocol for Low-cost Tags", WiSec'08, pp. 140-147, 2008.
-
(2008)
WiSec'08
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
17
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems", SPC 2003, ser. LNCS 2802, pp. 454-469, 2003.
-
(2003)
SPC 2003, Ser. LNCS 2802
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|