-
2
-
-
77955080938
-
-
U.S. Department of State
-
U.S. Department of State: The U.S. electronic passport, http://travel.state.gov/passport/passport-2498.html
-
The U.S. Electronic Passport
-
-
-
3
-
-
77955210406
-
-
November
-
EMVCo: About EMV (November 2009), http://www.emvco.com/about-emv.aspx
-
(2009)
About EMV
-
-
-
4
-
-
84865575986
-
-
Washington State Department of Licensing: Enhanced driver license/ID card, http://www.dol.wa.gov/about/news/priorities/edl.html
-
Enhanced Driver License/ID Card
-
-
-
6
-
-
80054793984
-
-
Cryptology ePrint Archive, Report 2010/332
-
Francillon, A., Danev, B., Capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. Cryptology ePrint Archive, Report 2010/332 (2010), http://eprint.iacr.org/
-
(2010)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
-
-
Francillon, A.1
Danev, B.2
Capkun, S.3
-
7
-
-
84865575983
-
-
ITGlobal Consulting LTD: RFID toll road payment, http://www. itglobalconsulting.com/rfidtollroadpayment.asp
-
RFID Toll Road Payment
-
-
-
10
-
-
84865594597
-
VeriChip corporation announces phase II development of in vivo glucose-sensing RFID microchip with RECEPTORS LLC
-
October
-
Medical News Today: VeriChip corporation announces phase II development of in vivo glucose-sensing RFID microchip with RECEPTORS LLC (October 2009), http://www.medicalnewstoday.com/articles/165894.php
-
(2009)
Medical News Today
-
-
-
12
-
-
84865575985
-
-
Technical report, Tuck School of Business at Dart-mouth
-
Gilman, J.: Next-gen payments. Technical report, Tuck School of Business at Dart-mouth (2011)
-
(2011)
Next-gen Payments
-
-
Gilman, J.1
-
17
-
-
84976295016
-
Distance Bounding Protocols
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
18
-
-
78049451613
-
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems
-
Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
-
Nithyanand, R., Tsudik, G., Uzun, E.: Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 19-36. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6345
, pp. 19-36
-
-
Nithyanand, R.1
Tsudik, G.2
Uzun, E.3
-
19
-
-
80052999922
-
Usability of Display-Equipped RFID Tags for Security Purposes
-
Atluri, V., Diaz, C. (eds.) ESORICS 2011. Springer, Heidelberg
-
Kobsa, A., Nithyanand, R., Tsudik, G., Uzun, E.: Usability of Display-Equipped RFID Tags for Security Purposes. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 434-451. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6879
, pp. 434-451
-
-
Kobsa, A.1
Nithyanand, R.2
Tsudik, G.3
Uzun, E.4
-
20
-
-
84860673845
-
Location-aware and safer cards: Enhancing rfid security and privacy via location sensing
-
to appear, April technologies Inc, B.: Bump Application
-
Ma, D., Prasad, A.K., Saxena, N., Xiang, T.: Location-aware and safer cards: Enhancing rfid security and privacy via location sensing. In: ACM Conference on Wireless Network Security (WiSec) (to appear, April 2012) 21. technologies Inc, B.: Bump Application
-
(2012)
ACM Conference on Wireless Network Security (WiSec)
, pp. 21
-
-
Ma, D.1
Prasad, A.K.2
Saxena, N.3
Xiang, T.4
-
21
-
-
85028745474
-
Special Uses and Abuses of the Fiat Shamir Passport Protocol
-
Pomerance, C. (ed.) CRYPTO 1987. Springer, Heidelberg
-
Desmedt, Y.G., Goutier, C., Bengio, S.: Special Uses and Abuses of the Fiat Shamir Passport Protocol. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 21-39. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.293
, pp. 21-39
-
-
Desmedt, Y.G.1
Goutier, C.2
Bengio, S.3
-
22
-
-
85150485002
-
Location privacy via private proximity testing
-
Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Network and Distributed System Security Symposium (NDSS) (2011)
-
(2011)
Network and Distributed System Security Symposium (NDSS)
-
-
Narayanan, A.1
Thiagarajan, N.2
Lakhani, M.3
Hamburg, M.4
Boneh, D.5
|