-
1
-
-
84655177743
-
Extending the EPC network: The potential of RFID in anti-counterfeiting
-
Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC network: the potential of RFID in anti-counterfeiting. Auto-ID Labs White Paper (2005)
-
(2005)
Auto-ID Labs White Paper
-
-
Staake, T.1
Thiesse, F.2
Fleisch, E.3
-
3
-
-
67349277179
-
PAP: A privacy and authentication protocol for passive RFID tags
-
Liu, A.X., Bailey, L.A.: PAP: A privacy and authentication protocol for passive RFID tags. Computer Communications 32(7-10), 1194-1199 (2009)
-
(2009)
Computer Communications
, vol.32
, Issue.7-10
, pp. 1194-1199
-
-
Liu, A.X.1
Bailey, L.A.2
-
4
-
-
84865741288
-
A minimum disclosure approach to authentication and privacy in RFID systems
-
in press
-
Doss, R., Zhou, W., Sundaresan, S., Yu, S., Gao, L.: A minimum disclosure approach to authentication and privacy in RFID systems. Computer Networks (in press, 2012), http://dx.doi.org/10.1016/j.comnet.20-12.06.018
-
(2012)
Computer Networks
-
-
Doss, R.1
Zhou, W.2
Sundaresan, S.3
Yu, S.4
Gao, L.5
-
5
-
-
33144457479
-
RFID security and privacy: A research survey
-
Juels, A.: RFID security and privacy: a research survey. Selected Areas in Communications 24(2), 381-394 (2006)
-
(2006)
Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
6
-
-
33745761701
-
Scalable and Flexible Privacy Protection Scheme for RFID Systems
-
Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. Springer, Heidelberg
-
Yeo, S.-S., Kim, S.K.: Scalable and Flexible Privacy Protection Scheme for RFID Systems. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 153-163. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3813
, pp. 153-163
-
-
Yeo, S.-S.1
Kim, S.K.2
-
8
-
-
33749379761
-
Mutual authentication protocol for low-cost RFID
-
Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Proc. of the Workshop on RFID and Lightweight Cryptography, pp. 17-24 (2005)
-
(2005)
Proc. of the Workshop on RFID and Lightweight Cryptography
, pp. 17-24
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
-
9
-
-
35248872610
-
RFID Systems and Security and Privacy Implications
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
-
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454-469. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2523
, pp. 454-469
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
12
-
-
33750291916
-
RFID Systems: A Survey on Security Threats and Proposed Solutions
-
Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. Springer, Heidelberg
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159-170. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4217
, pp. 159-170
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
15
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing 2003. Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing 2003. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
16
-
-
84919847483
-
Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
-
doi:10.1016/j.camwa.2012.02.025
-
Cho, J.S., Jeong, Y.S., Park, S.O.: Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers and Mathematics with Applications, doi:10.1016/j.camwa.2012.02.025
-
Computers and Mathematics with Applications
-
-
Cho, J.S.1
Jeong, Y.S.2
Park, S.O.3
-
17
-
-
84869783330
-
Desynchronization Attack on Hash-based RFID Mutual Authentication Protocol
-
Kim, H.: Desynchronization Attack on Hash-based RFID Mutual Authentication Protocol. Journal of Security Engineering 9(4), 357-365 (2012)
-
(2012)
Journal of Security Engineering
, vol.9
, Issue.4
, pp. 357-365
-
-
Kim, H.1
|