-
1
-
-
77956578953
-
Scalable rfid systems: A privacy-preserving protocol with constant-Time identification
-
B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification," Proc. 40th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN '10), pp. 1-10, 2010.
-
(2010)
Proc. 40th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN '10)
, pp. 1-10
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
2
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
DOI 10.1109/MSP.2005.78
-
S. Garfinkel, A. Juels, and R. Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions," IEEE Security & Privacy Magazine, vol. 3, no. 3, pp. 34-43, May/June 2005. (Pubitemid 40860471)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
5
-
-
33745621564
-
Reducing time complexity in rfid systems
-
G. Avoine, E. Dysli, and P. Oechslin, "Reducing Time Complexity in RFID Systems," Proc. 12th Int'l Workshop Selected Areas in Cryptography (SAC '05), pp. 291-306, 2005.
-
(2005)
Proc. 12th Int'l Workshop Selected Areas in Cryptography (SAC '05)
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
6
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
DOI 10.1109/TDSC.2007.70226
-
H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 4, pp. 337-340, Oct.-Dec. 2007. (Pubitemid 350125898)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
8
-
-
14844294769
-
Privacy and security in library RFID issues, practices, and architectures
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures," Proc. 11th ACM Conf. Computer and Comm. Security (CCS '04), pp. 210-219, 2004. (Pubitemid 40338202)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
9
-
-
33644907731
-
Adaptive binary splitting for efficient RFID tag anti-collision
-
DOI 10.1109/LCOMM.2006.1603365
-
J. Myung, W. Lee, and J. Srivastava, "Adaptive Binary Splitting for Efficient RFID Tag Anti-Collision," IEEE Comm. Letters, vol. 10, no. 3, pp. 144-146, Mar. 2006. (Pubitemid 43379997)
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.3
, pp. 144-146
-
-
Myung, J.1
Lee, W.2
Srivastava, J.3
-
10
-
-
33751069820
-
Fast and reliable estimation schemes in RFID systems
-
Proceedings of the Twelfth Annual International Conference on Mobile Computing and Networking, MOBICOM 2006
-
M. Kodialam and T. Nandagopal, "Fast and Reliable Estimation Schemes in RFID Systems," Proc. MobiCom '06, pp. 322-333, 2006. (Pubitemid 44758726)
-
(2006)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, vol.2006
, pp. 322-333
-
-
Kodialam, M.1
Nandagopal, T.2
-
11
-
-
34548562075
-
Asap: A mac protocol for dense and time-constrained rfid systems
-
G. Khandelwal, K. Lee, A. Yener, and S. Serbetli, "ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems," EURASIP J. Wireless Comm. and Networking, vol. 2007, no. 2, pp. 1-13, 2007.
-
(2007)
EURASIP J. Wireless Comm. and Networking
, vol.2007
, Issue.2
, pp. 1-13
-
-
Khandelwal, G.1
Lee, K.2
Yener, A.3
Serbetli, S.4
-
12
-
-
34547617482
-
Dynamic key-updating: Privacy-preserving authentication for rfid systems
-
L. Lu, J. Han, L. Hu, Y. Liu, and L. Ni, "Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems," Proc. Fifth Ann. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '07), pp. 13-22, 2007.
-
(2007)
Proc. Fifth Ann. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '07)
, pp. 13-22
-
-
Lu, L.1
Han, J.2
Hu, L.3
Liu, Y.4
Ni, L.5
-
13
-
-
47649131906
-
Storage-Awareness: Rfid private authentication based on sparse tree
-
W. Wang, Y. Li, L. Hu, and L. Lu, "Storage-Awareness: RFID Private Authentication Based on Sparse Tree," Proc. Third Int'l Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU '07), pp. 61-66, 2007.
-
(2007)
Proc. Third Int'l Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU '07)
, pp. 61-66
-
-
Wang, W.1
Li, Y.2
Hu, L.3
Lu, L.4
-
14
-
-
70349666896
-
Action: Breaking the privacy barrier for rfid systems
-
L. Lu, J. Han, R. Xiao, and Y. Liu, "ACTION: Breaking the Privacy Barrier for RFID Systems," Proc. IEEE INFOCOM '09, pp. 1953-1961, 2009.
-
(2009)
Proc. IEEE INFOCOM '09
, pp. 1953-1961
-
-
Lu, L.1
Han, J.2
Xiao, R.3
Liu, Y.4
-
15
-
-
78650076689
-
Time measurement threatens privacy-friendly rfid authentication protocols
-
G. Avoine, I. Coisel, and T. Martin, "Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols," Proc. Sixth Workshop RFID Security and Privacy (RFIDsec '10), pp. 138-157, 2010.
-
(2010)
Proc. Sixth Workshop RFID Security and Privacy (RFIDsec '10)
, pp. 138-157
-
-
Avoine, G.1
Coisel, I.2
Martin, T.3
-
16
-
-
78049383154
-
Privacy versus scalability in radio frequency identification systems
-
B. Alomair and R. Poovendran, "Privacy Versus Scalability in Radio Frequency Identification Systems," Computer Comm., vol. 33, no. 18, pp. 2155-2163, 2010.
-
(2010)
Computer Comm.
, vol.33
, Issue.18
, pp. 2155-2163
-
-
Alomair, B.1
Poovendran, R.2
-
18
-
-
38149037913
-
Passive attacks on a class of authentication protocols for rfid
-
B. Alomair, L. Lazos, and R. Poovendran, "Passive Attacks on a Class of Authentication Protocols for RFID," Proc. 10th Int'l Conf. Information Security and Cryptology (ICISC '07), pp. 102-115, 2007.
-
(2007)
Proc. 10th Int'l Conf. Information Security and Cryptology (ICISC '07)
, pp. 102-115
-
-
Alomair, B.1
Lazos, L.2
Poovendran, R.3
-
20
-
-
70349337026
-
Randomizing rfid private authentication
-
Q. Yao, Y. Qi, J. Han, J. Zhao, X. Li, and Y. Liu, "Randomizing RFID Private Authentication," Proc. Seventh Ann. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '09), pp. 1-10, 2009.
-
(2009)
Proc. Seventh Ann. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '09)
, pp. 1-10
-
-
Yao, Q.1
Qi, Y.2
Han, J.3
Zhao, J.4
Li, X.5
Liu, Y.6
-
21
-
-
77953302294
-
Refresh: Weak privacy model for rfid systems
-
L. Lu, Y. Liu, and X. Li, "Refresh: Weak Privacy Model for Rfid Systems," Proc. IEEE INFOCOM '10, pp. 1-9, 2010.
-
(2010)
Proc. IEEE INFOCOM '10
, pp. 1-9
-
-
Lu, L.1
Liu, Y.2
Li, X.3
-
22
-
-
79952959811
-
Securing low-cost rfid systems: An unconditionally secure approach
-
B. Alomair, L. Lazos, and R. Poovendran, "Securing Low-Cost RFID Systems: An Unconditionally Secure Approach," J. Computer Security, vol. 19, no. 2, pp. 229-256, 2011.
-
(2011)
J. Computer Security
, vol.19
, Issue.2
, pp. 229-256
-
-
Alomair, B.1
Lazos, L.2
Poovendran, R.3
-
23
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags (extended abstract)
-
Security in Communication Networks - 4th International Conference, SCN 2004
-
A. Juels, "Minimalist Cryptography for Low-Cost RFID Tags," Proc. Int'l Conf. Security in Comm. Networks, pp. 149-164, 2005. (Pubitemid 41191003)
-
(2005)
Lecture Notes in Computer Science
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
27
-
-
33750290259
-
YA-TRAP: Yet another trivial RFID authentication protocol
-
DOI 10.1109/PERCOMW.2006.152, 1599066, Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
-
G. Tsudik, "YA-TRAP: Yet Another Trivial RFID Authentication Protocol," Proc. Fourth Ann. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '06), pp. 640-643, 2006. (Pubitemid 44612661)
-
(2006)
Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
, vol.2006
, pp. 640-643
-
-
Tsudik, G.1
-
28
-
-
41549161615
-
Privacy of recent RFID authentication protocols
-
DOI 10.1007/978-3-540-79104-1-19, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings
-
K. Ouafi and R. Phan, "Privacy of Recent RFID Authentication Protocols," Proc. Fourth Int'l Conf. Information Security Practice and Experience (ISPEC '08), pp. 263-277, 2008. (Pubitemid 351465331)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4991
, pp. 263-277
-
-
Ouafi, K.1
Phan, R.C.-W.2
-
29
-
-
67650102497
-
A security and performance evaluation of hash-based rfid protocols
-
T. Lim, T. Li, and Y. Li, "A Security and Performance Evaluation of Hash-Based RFID Protocols," Proc. Fourth Int'l Conf. Information Security and Cryptology (Inscrypt '08), pp. 406-424, 2008.
-
(2008)
Proc. Fourth Int'l Conf. Information Security and Cryptology (Inscrypt '08)
, pp. 406-424
-
-
Lim, T.1
Li, T.2
Li, Y.3
-
30
-
-
78049418310
-
-
Technical Report 2009/092, Cryptology ePrint Archive, IACR
-
J.H. Cheon, J. Hong, and G. Tsudik, "Reducing RFID Reader Load with the Meet-in-The-Middle Strategy," Technical Report 2009/092, Cryptology ePrint Archive, IACR, 2009.
-
Reducing RFID Reader Load with the Meet-in-The-Middle Strategy
, pp. 2009
-
-
Cheon, J.H.1
Hong, J.2
Tsudik, G.3
-
32
-
-
33744957484
-
-
Technical Report LASEC-REPORT-2005-001, Swiss Fed. Inst. of Technology (EPFL), Security and Cryptography Laboratory (LASEC)
-
G. Avoine, "Adversarial Model for Radio Frequency Identification," Technical Report LASEC-REPORT-2005-001, Swiss Fed. Inst. of Technology (EPFL), Security and Cryptography Laboratory (LASEC), 2005.
-
(2005)
Adversarial Model for Radio Frequency Identification
-
-
Avoine, G.1
-
33
-
-
34547687590
-
Defining strong privacy for RFID
-
DOI 10.1109/PERCOMW.2007.37, 4144854, Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
-
A. Juels and S. Weis, "Defining Strong Privacy for RFID," Proc. Fifth Ann. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '07), pp. 342-347, 2007. (Pubitemid 47214235)
-
(2007)
Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
34
-
-
74049095938
-
Rfid privacy: Relation between two notions, minimal condition, and efficient construction
-
C. Ma, Y. Li, R. Deng, and T. Li, "RFID Privacy: Relation Between Two Notions, Minimal Condition, and Efficient Construction," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), pp. 54-65, 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09)
, pp. 54-65
-
-
Ma, C.1
Li, Y.2
Deng, R.3
Li, T.4
-
35
-
-
84865498114
-
Securing low-cost rfid systems: An unconditionally secure approach
-
B. Alomair, L. Lazos, and R. Poovendran, "Securing Low-Cost RFID Systems: An Unconditionally Secure Approach," Proc. The Asia Workshop Radio Frequency Identification System Security (RFIDsec '10), pp. 1-17, 2010.
-
(2010)
Proc. The Asia Workshop Radio Frequency Identification System Security (RFIDsec '10)
, pp. 1-17
-
-
Alomair, B.1
Lazos, L.2
Poovendran, R.3
-
36
-
-
84863526106
-
-
http://ti.com/rfid/shtml/doc-center-datasheets.shtml, 2012.
-
(2012)
-
-
-
37
-
-
45949097329
-
Report from the first workshop on extremely large databases
-
J. Becla and K.-T. Lim, "Report from the First Workshop on Extremely Large Databases," Data Science J., vol. 7, pp. 1-13, 2008.
-
(2008)
Data Science J.
, vol.7
, pp. 1-13
-
-
Becla, J.1
Lim, K.-T.2
-
38
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels, "RFID Security and Privacy: A Research Survey," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 381-394, Feb. 2006. (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
39
-
-
78649313774
-
Physical-layer identification of uhf rfid tags
-
D. Zanetti, B. Danev, and S. Capkun, "Physical-Layer Identification of UHF RFID Tags," Proc. MobiCom '10, pp. 353-364, 2010.
-
(2010)
Proc. MobiCom '10
, pp. 353-364
-
-
Zanetti, D.1
Danev, B.2
Capkun, S.3
-
40
-
-
84863526107
-
Rfid, privacy, and corporate data
-
"Rfid, Privacy, and Corporate Data," RFID J., 2003.
-
(2003)
RFID J.
-
-
-
42
-
-
78650114205
-
A lightweight implementation of keccak hash function for radio-frequency identification applications
-
E.B. Kavun and T. Yalcin, "A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications," Proc. Sixth Int'l Workshop RFID Security (RFIDsec '10), pp. 258-269, 2010.
-
(2010)
Proc. Sixth Int'l Workshop RFID Security (RFIDsec '10)
, pp. 258-269
-
-
Kavun, E.B.1
Yalcin, T.2
|