-
1
-
-
33744957484
-
Adversarial model for radio frequency identification
-
Security and Cryptography Laboratory (LASEC)
-
Avoine G. Adversarial model for radio frequency identification. Tech. rep. Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC); 2005.
-
(2005)
Tech. Rep. Swiss Federal Institute of Technology (EPFL)
-
-
Avoine, G.1
-
2
-
-
76749106728
-
When compromised readers meet RFID
-
H. Youm, M. Yung, Springer Busan, Korea
-
G. Avoine, C. Lauradoux, and T. Martin When compromised readers meet RFID H. Youm, M. Yung, Workshop on information security applications (WISA09). Lecture notes in computer science vol. 5932 2009 Springer Busan, Korea 36 50
-
(2009)
Workshop on Information Security Applications (WISA09). Lecture Notes in Computer Science
, vol.5932
, pp. 36-50
-
-
Avoine, G.1
Lauradoux, C.2
Martin, T.3
-
3
-
-
84860658962
-
A privacy-restoring mechanism for offline RFID systems
-
New York, NY, USA: ACM
-
Avoine G, Coisel I, Martin T. A privacy-restoring mechanism for offline RFID systems. In: Proceedings of the 5th ACM conference on security and privacy in wireless and mobile networks (WISEC 12). New York, NY, USA: ACM; 2012. p. 63-4.
-
(2012)
Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC 12)
, pp. 63-64
-
-
Avoine, G.1
Coisel, I.2
Martin, T.3
-
4
-
-
77952067218
-
-
O. Baudron, F. Boudot, P. Bourel, E. Bresson, J. Corbel, and L. Frisch GPS - an asymmetric identification scheme for on the fly authentication of low cost smart cards 2001
-
(2001)
GPS - An Asymmetric Identification Scheme for on the Fly Authentication of Low Cost Smart Cards
-
-
Baudron, O.1
Boudot, F.2
Bourel, P.3
Bresson, E.4
Corbel, J.5
Frisch, L.6
-
5
-
-
55649115408
-
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
-
Baltimore, MD, USA: IEEE Computer Society
-
Burmester M, Le Tv, Medeiros Bd. Provably secure ubiquitous systems: universally composable RFID authentication protocols. In: IEEE conference on security and privacy for emerging areas in communication networks (secureComm 2006). Baltimore, MD, USA: IEEE Computer Society; 2006. p. 1-10.
-
(2006)
IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2006)
, pp. 1-10
-
-
Burmester, M.1
Tv, L.2
Medeiros, Bd.3
-
7
-
-
50249134033
-
Initial SRAM state as a fingerprint and source of true random numbers for RFID tags
-
Daniel E. Holcomb, Wayne P. Burleson, and Kevin Fu. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Conference on RFID security (RFIDSec); 2007.
-
(2007)
Conference on RFID Security (RFIDSec)
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
8
-
-
78049406406
-
A new framework for RFID privacy
-
D. Gritzalis, B. Preneel, M. Theoharidou, Springer Athens, Greece
-
R.H. Deng, Y. Li, M. Yung, and Y. Zhao A new framework for RFID privacy D. Gritzalis, B. Preneel, M. Theoharidou, 15th European symposium on research in computer security (ESORICS 2010). Lecture notes in computer science vol. 6345 2010 Springer Athens, Greece 1 18
-
(2010)
15th European Symposium on Research in Computer Security (ESORICS 2010). Lecture Notes in Computer Science
, vol.6345
, pp. 1-18
-
-
Deng, R.H.1
Li, Y.2
Yung, M.3
Zhao, Y.4
-
9
-
-
49049105769
-
Design and implementation of PUF-based Unclonable RFID ICs for anti-counterfeiting and security applications
-
Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V. Design and implementation of PUF-based Unclonable RFID ICs for anti-counterfeiting and security applications. In: IEEE international conference on RFID, 2008; 2008. p. 58-64.
-
(2008)
IEEE International Conference on RFID, 2008
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
10
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
ISSN: 0097-5397
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith Fuzzy extractors: how to generate strong keys from biometrics and other noisy data SIAM Journal on Computing 38 1 2008 97 139 ISSN: 0097-5397
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
11
-
-
46449138830
-
Controlled physical random functions
-
doi:10.1109/CSAC.2002.1176287 ISSN: 1063-9527
-
Gassend B, Clarke D, van Dijk M, Devadas S. Controlled physical random functions. In: Proceedings of the 18th annual computer security applications conference, 2002; 2002. p. 149-60, ISSN: 1063-9527, http://dx.doi.org/10.1109/ CSAC.2002.1176287.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference, 2002
, pp. 149-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
12
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
doi:10.1007/978-3-540-74735-2-5 Berlin/Heidelberg: Springer-Verlag ISBN: 978-3-540-74734-5
-
Guajardo J, Kumar SS, Schrijen G-J, Tuyls P. FPGA intrinsic PUFs and their use for IP protection. In: Proceedings of the 9th international workshop on cryptographic hardware and embedded systems (CHES 07). Berlin/Heidelberg: Springer-Verlag; 2007. p. 63-0, ISBN: 978-3-540-74734-5, http://dx.doi.org/10. 1007/978-3-540-74735-2-5, URL 〈 http://dx.doi.org/10.1007/978-3-540-74735- 2-5 〉.
-
(2007)
Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 07)
, pp. 63-64
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.-J.3
Tuyls, P.4
-
13
-
-
57049137188
-
A new formal proof model for RFID location privacy
-
S. Jajodia, J. Lopez, Springer Malaga, Spain
-
J. Ha, S. Moon, J. Zhou, and J. Ha A new formal proof model for RFID location privacy S. Jajodia, J. Lopez, 13th European symposium on research in computer security (ESORICS 2008). Lecture notes in computer science vol. 5283 2008 Springer Malaga, Spain 267 281
-
(2008)
13th European Symposium on Research in Computer Security (ESORICS 2008). Lecture Notes in Computer Science
, vol.5283
, pp. 267-281
-
-
Ha, J.1
Moon, S.2
Zhou, J.3
Ha, J.4
-
16
-
-
84856112202
-
Novel RFID distance bounding protocol based on physically unclonable functions
-
Berlin, Heidelberg: Springer
-
Kardas S, Kiraz MS, Bingol MA, Demirci HA. Novel RFID distance bounding protocol based on physically unclonable functions. In: RFID. Security and Privacy, Lecture Notes in Computer Science, vol. 7055. Berlin, Heidelberg: Springer; 2012. p. 78-93.
-
(2012)
RFID. Security and Privacy, Lecture Notes in Computer Science
, vol.7055
, pp. 78-93
-
-
Kardas, S.1
Kiraz, M.S.2
Bingol, M.A.3
Demirci, H.A.4
-
18
-
-
79956314470
-
Revisiting unpredictability-based RFID privacy models
-
J. Zhou, M. Yung, Springer Beijing, China
-
J. Lai, R.H. Deng, and Y. Li Revisiting unpredictability-based RFID privacy models J. Zhou, M. Yung, Proceedings of the 8th international conference on applied cryptography and network security (ACNS 2010). Lecture notes in computer science vol. 6123 2010 Springer Beijing, China 475 492
-
(2010)
Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010). Lecture Notes in Computer Science
, vol.6123
, pp. 475-492
-
-
Lai, J.1
Deng, R.H.2
Li, Y.3
-
19
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
doi:10.1109/VLSIC.2004.1346548 Digest of technical papers
-
Lee J, Lim D, Gassend B, Suh G, van Dijk M, Devadas S. A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium on VLSI circuits, 2004. Digest of technical papers; 2004. p. 176-9, http://dx.doi.org/10.1109/VLSIC.2004.1346548.
-
(2004)
Symposium on VLSI Circuits, 2004
, pp. 176-179
-
-
Lee, J.1
Lim, D.2
Gassend, B.3
Suh, G.4
Van Dijk, M.5
Devadas, S.6
-
23
-
-
84867511846
-
WIPR - A public key implementation on two grains of sand
-
S. Dominikus
-
Y. Oren, and M. Feldhofer WIPR - a public key implementation on two grains of sand S. Dominikus, Workshop on RFID security 2008 2008 15 27
-
(2008)
Workshop on RFID Security 2008
, pp. 15-27
-
-
Oren, Y.1
Feldhofer, M.2
-
24
-
-
49149115221
-
Towards robust low cost authentication for pervasive devices
-
Washington, DC, USA: IEEE Computer Society ISBN: 978-0-7695-3113-7
-
Öztürk E, Hammouri G, Sunar B. Towards robust low cost authentication for pervasive devices. In: Proceedings of the 2008 6th annual IEEE international conference on pervasive computing and communications (PERCOM 08). Washington, DC, USA: IEEE Computer Society; 2008. p. 170-8, ISBN: 978-0-7695-3113-7.
-
(2008)
Proceedings of the 2008 6th Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM 08)
, pp. 170-178
-
-
Öztürk, E.1
Hammouri, G.2
Sunar, B.3
-
25
-
-
70349118926
-
Mutual authentication in RFID: Security and privacy
-
New York, NY, USA: ACM ISBN: 978-1-59593-979-1
-
Paise R-I, Vaudenay S. Mutual authentication in RFID: security and privacy. In: Proceedings of the 2008 ACM symposium on information, computer and communications security (ASIACCS 08). New York, NY, USA: ACM; 2008. p. 292-9, ISBN: 978-1-59593-979-1.
-
(2008)
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS 08)
, pp. 292-299
-
-
Paise, R.-I.1
Vaudenay, S.2
-
29
-
-
85008008223
-
A digital 1.6 pJ/bit chip identification circuit using process variations
-
Y. Su, J. Holleman, and B.P. Otis A digital 1.6 pJ/bit chip identification circuit using process variations IEEE Journal of Solid-State Circuits 43 1 2008 69 77
-
(2008)
IEEE Journal of Solid-State Circuits
, vol.43
, Issue.1
, pp. 69-77
-
-
Su, Y.1
Holleman, J.2
Otis, B.P.3
-
30
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
ACM/IEEE ISSN: 0738-100X
-
Suh G, Devadas S. Physical unclonable functions for device authentication and secret key generation. In: 44th design automation conference, 2007 (DAC 07). ACM/IEEE; 2007. p. 9-14, ISSN: 0738-100X.
-
(2007)
44th Design Automation Conference, 2007 (DAC 07)
, pp. 9-14
-
-
Suh, G.1
Devadas, S.2
-
31
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
New York, NY, USA: ACM ISBN: 978-1-59593-627-1
-
Suh GE, Devadas S. Physical unclonable functions for device authentication and secret key generation. In: DAC 07: proceedings of the 44th annual design automation conference. New York, NY, USA: ACM; 2007. p. 9-14, ISBN: 978-1-59593-627-1.
-
(2007)
DAC 07: Proceedings of the 44th Annual Design Automation Conference
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
34
-
-
33750726983
-
Read-proof hardware from protective coatings
-
doi:10.1007/11894063-29 Berlin/Heidelberg: Springer-Verlag ISBN: 3-540-46559-6, 978-3-540-46559-1
-
Tuyls P, Schrijen G-J, Škorić B, van Geloven J, Verhaegh N, Wolters R. Read-proof hardware from protective coatings. In: Proceedings of the 8th international conference on cryptographic hardware and embedded systems (CHES06). Berlin/Heidelberg: Springer-Verlag; 2006. p. 369-83, ISBN: 3-540-46559-6, 978-3-540-46559-1, http://dx.doi.org/10.1007/11894063-29.
-
(2006)
Proceedings of the 8th International Conference on Cryptographic Hardware and Embedded Systems (CHES06)
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.-J.2
Škorić, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
35
-
-
78650185683
-
Hardware intrinsic security from D flip-flops
-
doi:10.1145/1867635.1867644 New York, NY, USA: ACM ISBN: 978-1-4503-0095-7
-
van der Leest V, Schrijen G-J, Handschuh H, Tuyls P. Hardware intrinsic security from D flip-flops. In: Proceedings of the 5th ACM workshop on scalable trusted computing (STC 10). New York, NY, USA: ACM; 2010. p. 53-62, ISBN: 978-1-4503-0095-7, http://dx.doi.org/10.1145/1867635.1867644.
-
(2010)
Proceedings of the 5th ACM Workshop on Scalable Trusted Computing (STC 10)
, pp. 53-62
-
-
Van Der Leest, V.1
Schrijen, G.-J.2
Handschuh, H.3
Tuyls, P.4
-
36
-
-
44649113207
-
Untraceability of RFID protocols
-
J.A. Onieva, D. Sauveron, S. Chaumette, D. Gollmann, C. Markantonakis, Springer Sevilla, Spain
-
T. van Deursen, S. Mauw, and S. Radomirović Untraceability of RFID protocols J.A. Onieva, D. Sauveron, S. Chaumette, D. Gollmann, C. Markantonakis, Workshop on information security theory and practice (WISTP08). Lecture notes in computer science vol. 5019 2008 Springer Sevilla, Spain 1 15
-
(2008)
Workshop on Information Security Theory and Practice (WISTP08). Lecture Notes in Computer Science
, vol.5019
, pp. 1-15
-
-
Van Deursen, T.1
Mauw, S.2
Radomirović, S.3
-
37
-
-
84865824388
-
Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
-
Springer
-
van Herrewege A, Katzenbeisser S, Maes R, Peeters R, Sadeghi A-R, Verbauwhede I, et al. Reverse fuzzy extractors: enabling lightweight mutual authentication for PUF-enabled RFIDs. In: Financial cryptography (FC 2012). Lecture notes in computer science. Springer; 2012.
-
(2012)
Financial Cryptography (FC 2012). Lecture Notes in Computer Science
-
-
Van Herrewege, A.1
Katzenbeisser, S.2
Maes, R.3
Peeters, R.4
Sadeghi, A.-R.5
Verbauwhede, I.6
|