-
1
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Washington, DC, USA
-
Molnar David, Wagner David. "Privacy and security in library RFID: Issues, practices, and architectures", In Proceeding(s) of the 11th ACM Conference on Computer and Communications Security(CCS 2004). Washington, DC, USA, pp. 210-219, 2004.
-
(2004)
Proceeding(s) of the 11th ACM Conference On Computer and Communications Security(CCS 2004)
, pp. 210-219
-
-
David, M.1
David, W.2
-
2
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer Privacy
-
Washington, DC, USA
-
Juels Ari, Rivest Ronald L., and Szydlo Michael. "The blocker tag: Selective blocking of RFID tags for consumer Privacy", In Proceeding(s) of the 10th ACM Conference on Computer and Communications Security (CCS 2003). Washington, DC, USA, pp. 103-111, 2003.
-
(2003)
Proceeding(s) of the 10th ACM Conference On Computer and Communications Security (CCS 2003)
, pp. 103-111
-
-
Ari, J.1
Rivest Ronald, L.2
Michael, S.3
-
3
-
-
79952396973
-
Security Improvement in Authentication Protocol for Gen-2 Based RFID System
-
Liangmin Wang, Xiaoluo Yi, Chao Lv, and Yuanbo Guo, Security Improvement in Authentication Protocol for Gen-2 Based RFID System, JCIT, Vol. 6, No. 1, pp. 157-169, 2011.
-
(2011)
JCIT
, vol.6
, Issue.1
, pp. 157-169
-
-
Wang, L.1
Yi, X.2
Lv, C.3
Guo, Y.4
-
4
-
-
79953702872
-
Security Analysis of a Privacy- preserving ECC-based Grouping-proof Protocol
-
Chao Lv, Hui Li, Jianfeng Ma, Ben Niu, and Haiyang Jiang, Security Analysis of a Privacy- preserving ECC-based Grouping-proof Protocol, JCIT, Vol. 6, No. 3, pp. 113-119, 2011.
-
(2011)
JCIT
, vol.6
, Issue.3
, pp. 113-119
-
-
Lv, C.1
Li, H.2
Ma, J.3
Niu, B.4
Jiang, H.5
-
9
-
-
47649132152
-
Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags
-
Peris-Lopez Pedro, Hernandez-Castro Julio C., Estevez-Tapiador Juan. M., and Ribagorda Arturo. "Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags", In Proceeding(s) of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp. 55-60, 2007.
-
(2007)
Proceeding(s) of the 3rd International Workshop On Security, Privacy and Trust In Pervasive and Ubiquitous Computing
, pp. 55-60
-
-
Pedro, P.-L.1
Hernandez-Castro Julio, C.2
Estevez-Tapiador J., M.3
Arturo, R.4
-
10
-
-
52949116082
-
Provably Secure Grouping-Proofs for RFID Tags
-
LNCS 5189
-
Burmester Mike, de Medeiros Breno, and Motta Rossana. "Provably Secure Grouping-Proofs for RFID Tags", In Proceeding(s) of CARDIS 2008, LNCS 5189, pp. 176-190, 2008.
-
(2008)
Proceeding(s) of CARDIS 2008
, pp. 176-190
-
-
Mike, B.1
de Breno, M.2
Rossana, M.3
-
11
-
-
38049018446
-
Coexistence proof using chain of timestamps for multiple RFID tags
-
Chih-Chung Lin, Yuan-Cheng Lai, J.D. Tygar, Chuan-Kai Yang, and Chi-Lung Chiang. "Coexistence proof using chain of timestamps for multiple RFID tags", In Proceeding(s) of the International Workshop on Application and Security Service in Web and Pervasive Environment, pp. 634-643, 2007.
-
(2007)
Proceeding(s) of the International Workshop On Application and Security Service In Web and Pervasive Environment
, pp. 634-643
-
-
Lin, C.-C.1
Lai, Y.-C.2
Tygar, J.D.3
Yang, C.-K.4
Chiang, C.-L.5
-
12
-
-
51849146549
-
Reading order independent grouping proof for RFID tags
-
Yuanhung Lien, Xuefei Leng, Keith Mayes, and Jung-Hui Chiu. "Reading order independent grouping proof for RFID tags", In Proceeding(s) of the IEEE International Conference on Intelligence and Security Informatics, pp. 128-136, 2008.
-
(2008)
Proceeding(s) of the IEEE International Conference On Intelligence and Security Informatics
, pp. 128-136
-
-
Lien, Y.1
Leng, X.2
Mayes, K.3
Chiu, J.-H.4
-
13
-
-
79959770845
-
Two RFID-based Solutions to Enhance Inpatient Medication Safety
-
Hung-Yu Chien, Chia-Chuan Yang, Tzong-Chen Wu, Chin-Feng Lee."Two RFID-based Solutions to Enhance Inpatient Medication Safety". J. Med. Syst. Vol.35, No. 3, pp. 369-375. 2011
-
(2011)
J. Med. Syst
, vol.35
, Issue.3
, pp. 369-375
-
-
Chien, H.-Y.1
Yang, C.-C.2
Tzong-Chen, W.3
Lee, C.-F.4
-
14
-
-
84870599770
-
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction
-
Dang Nguyen Duc, Kwangjo Kim. "Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction", Cryptology ePrint Archive, Report 2009/609, http://eprint.iacr.org/.
-
Cryptology EPrint Archive
-
-
Duc, D.N.1
Kim, K.2
-
15
-
-
33744957484
-
Adversarial Model for Radio Frequency Identification
-
report 2005/049. IACR ePrint Archive
-
Gildas. "Adversarial Model for Radio Frequency Identification". Cryptology ePrint Archive, report 2005/049. IACR ePrint Archive, http://eprint.iacr.org/2005/049, Feb. 2005.
-
(2005)
Cryptology EPrint Archive
-
-
Gildas1
-
16
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
LNCS3126. Springer-Verlag
-
Juels Ari, Weis Stephen A. "Authenticating pervasive devices with human protocols", In Proceeding(s) of CRYPTO'05, LNCS3126. Springer-Verlag, pp. 293-308, 2005.
-
(2005)
Proceeding(s) of CRYPTO'05
, pp. 293-308
-
-
Ari, J.1
Weis Stephen, A.2
-
17
-
-
84870618852
-
-
Printed handout of in Proceeding(s) of 2nd Workshop on RFID Security, July
-
Peris-Lopez Pedro, Hernandez-Castro Julio Cesar, Estevez-Tapiador Juan M., and Ribagorda Arturo. "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tag", Printed handout of in Proceeding(s) of 2nd Workshop on RFID Security, July 2006.
-
(2006)
LMAP: A Real Lightweight Mutual Authentication Protocol For Low-cost RFID Tag
-
-
Pedro, P.-L.1
Cesar, H.-C.J.2
Estevez-Tapiador, J.M.3
Arturo, R.4
-
18
-
-
34547687590
-
Defining strong privacy for RFID
-
Los Alamitos
-
Juels Ari, Weis, Stephen A. "Defining strong privacy for RFID", In Proceeding(s) of the PerCom 2007, IEEE Computer Society Press, Los Alamitos, pp. 342-347, 2007.
-
(2007)
Proceeding(s) of the PerCom 2007, IEEE Computer Society Press
, pp. 342-347
-
-
Ari, J.1
Weis, S.A.2
-
19
-
-
70450265312
-
Cryptanalysis of a new ultralightweight RFID authentication protocol- SASI
-
Phan, Raphael C.-W. Cryptanalysis of a new ultralightweight RFID authentication protocol- SASI. IEEE Transactions on Dependable and Secure Computing, Vol. 6, No 4, pp.316-320, 2009.
-
(2009)
IEEE Transactions On Dependable and Secure Computing
, vol.6
, Issue.4
, pp. 316-320
-
-
Phan1
Raphael, C.-W.2
-
20
-
-
60449095092
-
Security Analysis of the SASI Protocol
-
Tianjie Cao, Elisa Bertino, and Hong Lei. "Security Analysis of the SASI Protocol". IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 1, pp. 73-77, 2008.
-
(2008)
IEEE Transactions On Dependable and Secure Computing
, vol.6
, Issue.1
, pp. 73-77
-
-
Cao, T.1
Bertino, E.2
Lei, H.3
|