-
1
-
-
85076199332
-
-
November
-
The TARDIS, British Broadcasting Channel. http://www.bbc.co.uk/doctorwho/characters/tardis.shtml, November 1963.
-
(1963)
British Broadcasting Channel
-
-
-
6
-
-
54249156664
-
Epassport: Securing international contacts with contactless chips
-
G. Tsudik, Ed., Springer-Verlag
-
AVOINE, G., KALACH, K., AND QUISQUATER, J.-J. ePassport: Securing international contacts with contactless chips. In Financial Cryptography and Data Security (2008), G. Tsudik, Ed., Springer-Verlag, pp. 141–155.
-
(2008)
Financial Cryptography and Data Security
, pp. 141-155
-
-
Avoine, G.1
Kalach, K.2
Quisquater, J.-J.3
-
8
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
BONO, S. C., GREEN, M., STUBBLEFIELD, A., JUELS, A., RUBIN, A. D., AND SZYDLO, M. Security analysis of a cryptographically-enabled RFID device. In Proceedings of the 14th USENIX Security Symposium (2005).
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Bono, S.C.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.D.5
Szydlo, M.6
-
9
-
-
79953080739
-
-
BUETTNER, M., GREENSTEIN, B., WETHERALL, D., AND SMITH, J. R. Revisiting smart dust with RFID sensor networks, 2008.
-
(2008)
Revisiting Smart Dust with RFID Sensor Networks
-
-
Buettner, M.1
Greenstein, B.2
Wetherall, D.3
Smith, J.R.4
-
10
-
-
85076219306
-
-
Last Viewed May 14, 2012
-
CANTHERM. Thermal cut-offs. http://www.cantherm.com/products/thermal_fuses/sdf.html, 2011. Last Viewed May 14, 2012.
-
(2011)
Thermal Cut-Offs
-
-
-
13
-
-
0036294454
-
Drowsy caches: Simple techniques for reducing leakage power
-
FLAUTNER, K., KIM, N. S., MARTIN, S., BLAAUW, D., AND MUDGE, T. Drowsy caches: simple techniques for reducing leakage power. In Proc. 29th IEEE/ACM International Symposium on Computer Architecture (2002), pp. 148–157.
-
(2002)
Proc. 29th IEEE/ACM International Symposium on Computer Architecture
, pp. 148-157
-
-
Flautner, K.1
Kim, N.S.2
Martin, S.3
Blaauw, D.4
Mudge, T.5
-
14
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
WiSe’05
-
GANERIWAL, S., ČAPKUN, S., HAN, C.-C., AND SRIVASTAVA, M. B. Secure time synchronization service for sensor networks. In Proceedings of the 4th ACM Workshop on Wireless Security (2005), WiSe’05, pp. 97–106.
-
Proceedings of the 4th ACM Workshop on Wireless Security (2005)
, pp. 97-106
-
-
Ganeriwal, S.1
Čapkun, S.2
Han, C.-C.3
Srivastava, M.B.4
-
15
-
-
70350601194
-
Wirelessly pickpocketing a MIFARE Classic card
-
May
-
GARCIA, F. D., ROSSUM, P. V., VERDULT, R., AND SCHREUR, R. Wirelessly pickpocketing a MIFARE Classic card. In IEEE Symposium on Security and Privacy (May 2009), pp. 3–15.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 3-15
-
-
Garcia, F.D.1
Rossum, P.V.2
Verdult, R.3
Schreur, R.4
-
16
-
-
1942521575
-
-
Last Viewed February 19, 2012
-
GOLDBERG, I., AND BRICENCO, M. GSM cloning. http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html, 1999. Last Viewed February 19, 2012.
-
(1999)
GSM Cloning
-
-
Goldberg, I.1
Bricenco, M.2
-
17
-
-
68949195262
-
FPGA intrinsic PUFs and their use for IP protection
-
GUAJARDO, J., KUMAR, S., SCHRIJEN, G., AND TUYLS, P. FPGA intrinsic PUFs and their use for IP protection. In Cryptographic Hardware and Embedded Systems (CHES) (2007), pp. 86–80.
-
(2007)
Cryptographic Hardware and Embedded Systems (CHES)
, pp. 86-180
-
-
Guajardo, J.1
Kumar, S.2
Schrijen, G.3
Tuyls, P.4
-
19
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
HALDERMAN, J., SCHOEN, S., HENINGER, N., CLARKSON, W., PAUL, W., CALANDRINO, J., FELDMAN, A., APPELBAUM, J., AND FELTEN, E. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th USENIX Security Symposium (2008).
-
(2008)
Proceedings of the 17th USENIX Security Symposium
-
-
Halderman, J.1
Schoen, S.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.6
Feldman, A.7
Appelbaum, J.8
Felten, E.9
-
20
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
May
-
HALPERIN, D., HEYDT-BENJAMIN, T. S., RANSFORD, B., CLARK, S. S., DEFEND, B., MORGAN, W., FU, K., KOHNO, T., AND MAISEL, W. H. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the 29th Annual IEEE Symposium on Security and Privacy (May 2008), pp. 129–142.
-
(2008)
Proceedings of the 29th Annual IEEE Symposium on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
21
-
-
38549131714
-
Vulnerabilities in first-generation RFID-enabled credit cards
-
February
-
HEYDT-BENJAMIN, T. S., BAILEY, D. V., FU, K., JUELS, A., AND OHARE, T. Vulnerabilities in first-generation RFID-enabled credit cards. In Proceedings of Eleventh International Conference on Financial Cryptography and Data Security, Lecture Notes in Computer Science, Vol. 4886 (February 2007), pp. 2–14.
-
(2007)
Proceedings of Eleventh International Conference on Financial Cryptography and Data Security, Lecture Notes in Computer Science
, vol.4886
, pp. 2-14
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
Ohare, T.5
-
22
-
-
50149101991
-
Contact lens with integrated inorganic semiconductor devices
-
Jan
-
HO, H., SAEEDI, E., KIM, S., SHEN, T., AND PARVIZ, B. Contact lens with integrated inorganic semiconductor devices. In Micro Electro Mechanical Systems, 2008. MEMS 2008. IEEE 21st International Conference on (Jan. 2008), pp. 403–406.
-
(2008)
Micro Electro Mechanical Systems, 2008. MEMS 2008. IEEE 21st International Conference on
, pp. 403-406
-
-
Ho, H.1
Saeedi, E.2
Kim, S.3
Shen, T.4
Parviz, B.5
-
23
-
-
68949175522
-
Power-up SRAM state as an identifying fingerprint and source of true random numbers
-
HOLCOMB, D. E., BURLESON, W. P., AND FU, K. Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Transactions on Computers (2009).
-
(2009)
IEEE Transactions on Computers
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
24
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags (extended abstract)
-
C. Blundo and S. Cimato, Eds.,. of Lecture Notes in Computer Science. Springer
-
JUELS, A. Minimalist cryptography for low-cost RFID tags (extended abstract). In Security in Communication Networks, C. Blundo and S. Cimato, Eds., vol. 3352 of Lecture Notes in Computer Science. Springer, 2005, pp. 149–164.
-
(2005)
Security in Communication Networks
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
25
-
-
33144457479
-
RFID security and privacy: A research survey
-
February
-
JUELS, A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications 24, 2 (February 2006), 381–394.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
26
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
LAMPORT, L. Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21, 7 (1978), 558–565.
-
(1978)
Commun. ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
27
-
-
85076234838
-
Of privacy and security: The clipper chip debate
-
April 24
-
LEWIS, P. H. Of privacy and security: The clipper chip debate. The New York Times, April 24, 1994.
-
(1994)
The New York Times
-
-
Lewis, P.H.1
-
31
-
-
85076199201
-
-
Last Viewed February 18
-
NXP Semiconductors MIFARE classic. http://www.nxp.com/products/identification_and_security/smart_card_ ics/mifare_smart_card_ics/mifare_classic/. Last Viewed February 18, 2012.
-
(2012)
NXP Semiconductors MIFARE Classic
-
-
-
34
-
-
34548285839
-
Remote password extraction from RFID tags
-
Sept
-
OREN, Y., AND SHAMIR, A. Remote password extraction from RFID tags. Computers, IEEE Transactions on 56, 9 (Sept. 2007), 1292–1296.
-
(2007)
Computers, IEEE Transactions on
, vol.56
, Issue.9
, pp. 1292-1296
-
-
Oren, Y.1
Shamir, A.2
-
35
-
-
80053475909
-
Breaking MIFare desfire MF3ICD40: Power analysis and templates in the real world
-
OSWALD, D., AND PAAR, C. Breaking MIFARE DESFire MF3ICD40: Power analysis and templates in the real world. In Cryptographic Hardware and Embedded Systems (CHES) (2011), pp. 207–222.
-
(2011)
Cryptographic Hardware and Embedded Systems (CHES)
, pp. 207-222
-
-
Oswald, D.1
Paar, C.2
-
36
-
-
2942687683
-
SRAM leakage suppression by minimizing standby supply voltage
-
QIN, H., CAO, Y., MARKOVIC, D., VLADIMIRESCU, A., AND RABAEY, J. SRAM leakage suppression by minimizing standby supply voltage. In Proceedings of 5th International Symposium on Quality Electronic Design (2004), pp. 55–60.
-
(2004)
Proceedings of 5th International Symposium on Quality Electronic Design
, pp. 55-60
-
-
Qin, H.1
Cao, Y.2
Markovic, D.3
Vladimirescu, A.4
Rabaey, J.5
-
38
-
-
78751694609
-
Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling
-
Dec
-
RANSFORD, B., CLARK, S., SALAJEGHEH, M., AND FU, K. Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling. In USENIX Workshop on Power Aware Computing and Systems (HotPower’08) (Dec. 2008).
-
(2008)
USENIX Workshop on Power Aware Computing and Systems (HotPower’08)
-
-
Ransford, B.1
Clark, S.2
Salajegheh, M.3
Fu, K.4
-
39
-
-
0010602889
-
-
rep., Cambridge, MA, USA
-
RIVEST, R. L., SHAMIR, A., AND WAGNER, D. A. Time-lock puzzles and timed-release crypto. Tech. rep., Cambridge, MA, USA, 1996.
-
(1996)
Time-Lock Puzzles and Timed-Release Crypto. Tech
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
41
-
-
54949090328
-
Design of an RFID-based battery-free programmable sensing platform
-
Nov
-
SAMPLE, A. P., YEAGER, D. J., POWLEDGE, P. S., MAMISHEV, A. V., AND SMITH, J. R. Design of an RFID-based battery-free programmable sensing platform. IEEE Transactions on Instrumentation and Measurement 57, 11 (Nov. 2008), 2608–2615.
-
(2008)
IEEE Transactions on Instrumentation and Measurement
, vol.57
, Issue.11
, pp. 2608-2615
-
-
Sample, A.P.1
Yeager, D.J.2
Powledge, P.S.3
Mamishev, A.V.4
Smith, J.R.5
-
42
-
-
84856101295
-
We can remember it for you wholesale: Implications of data remanence on the use of RAM for true random number generation on RFID tags
-
SAXENA, N., AND VORIS, J. We can remember it for you wholesale: Implications of data remanence on the use of RAM for true random number generation on RFID tags. In Proceedings of the Conference on RFID Security (2009).
-
(2009)
Proceedings of the Conference on RFID Security
-
-
Saxena, N.1
Voris, J.2
-
45
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
B. Christianson, B. Crispo, J. Malcolm, and M. Roe, Eds.,. of Lecture Notes in Computer Science. Springer
-
STAJANO, F., AND ANDERSON, R. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols, B. Christianson, B. Crispo, J. Malcolm, and M. Roe, Eds., vol. 1796 of Lecture Notes in Computer Science. Springer, 2000, pp. 172–182.
-
(2000)
Security Protocols
, vol.1796
, pp. 172-182
-
-
Stajano, F.1
Anderson, R.2
-
46
-
-
34547282118
-
TinySerSync: Secure and resilient time synchronization in wireless sensor networks
-
SUN, K., NING, P., AND WANG, C. TinySeRSync: secure and resilient time synchronization in wireless sensor networks. In Proceedings of the 13th ACM Conference on Computer and Communications Security (2006), CCS’06, pp. 264–277.
-
Proceedings of the 13th ACM Conference on Computer and Communications Security (2006), CCS’06
, pp. 264-277
-
-
Sun, K.1
Ning, P.2
Wang, C.3
-
49
-
-
31144436352
-
An energy-aware active smart card
-
TESSIER, R., JASINSKI, D., MAHESHWARI, A., NATARAJAN, A., XU, W., AND BURLESON, W. An energy-aware active smart card. IEEE Transaction on Very Large Scale Integration (VLSI) Systems (2005).
-
(2005)
IEEE Transaction on Very Large Scale Integration (VLSI) Systems
-
-
Tessier, R.1
Jasinski, D.2
Maheshwari, A.3
Natarajan, A.4
Xu, W.5
Burleson, W.6
-
50
-
-
85076211007
-
Msp430F21x1 mixed signal microcontroller
-
Texas INSTRUMENTS INC. Sep. revised Aug. 2011
-
TEXAS INSTRUMENTS INC. MSP430F21x1 Mixed Signal Microcontroller. In Texas Instruments Application Report SLAS439F (Sep. 2004, revised Aug. 2011).
-
(2004)
Texas Instruments Application Report SLAS439F
-
-
-
54
-
-
77956439072
-
Negotiate power and performance in the reality of RFID systems
-
IEEE Computer Society
-
XU, X., GU, L., WANG, J., AND XING, G. Negotiate power and performance in the reality of RFID systems. In PerCom (2010), IEEE Computer Society, pp. 88–97.
-
(2010)
PerCom
, pp. 88-97
-
-
Xu, X.1
Gu, L.2
Wang, J.3
Xing, G.4
-
55
-
-
77957590291
-
A 9 µa, addressable Gen2 sensor tag for biosignal acquisition
-
Oct
-
YEAGER, D., ZHANG, F., ZARRASVAND, A., GEORGE, N., DANIEL, T., AND OTIS, B. A 9 µa, addressable Gen2 sensor tag for biosignal acquisition. IEEE Journal of Solid-State Circuits 45, 10 (Oct. 2010), 2198–2209.
-
(2010)
IEEE Journal of Solid-State Circuits
, vol.45
, Issue.10
, pp. 2198-2209
-
-
Yeager, D.1
Zhang, F.2
Zarrasvand, A.3
George, N.4
Daniel, T.5
Otis, B.6
-
56
-
-
81055140310
-
-
Tech. Rep. UM-CS-2011-020, Department of Computer Science, University of Massachusetts Amherst, Amherst, MA, June
-
ZHANG, H., GUMMESON, J., RANSFORD, B., AND FU, K. Moo: A batteryless computational RFID and sensing platform. Tech. Rep. UM-CS-2011-020, Department of Computer Science, University of Massachusetts Amherst, Amherst, MA, June 2011.
-
(2011)
Moo: A Batteryless Computational RFID and Sensing Platform
-
-
Zhang, H.1
Gummeson, J.2
Ransford, B.3
Fu, K.4
|