-
1
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
Juels A. RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 2006; 24(2): 381-394. (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
2
-
-
33847282484
-
A pull-based service replication protocol in mobile ad hoc networks
-
DOI 10.1002/ett.1080
-
Derhab A, Badache N. A pull-based service replication protocol in mobile ad hoc networks. European Transactions on Telecommunications 2007; 18(1): 1-11. DOI: 10.1002/ett.1080. URL http://dx.doi.org/10.1002/ett.1080. (Pubitemid 46325386)
-
(2007)
European Transactions on Telecommunications
, vol.18
, Issue.1
, pp. 1-11
-
-
Derhab, A.1
Badache, N.2
-
3
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
ACM, ACM Press: Alexandria, Virginia, USA
-
Song B, Mitchell CJ. RFID authentication protocol for low-cost tags, In Proceedings of the first ACM Conference on Wireless Network Security - WiSec'08, ACM, ACM Press: Alexandria, Virginia, USA, 2008; 140-147.
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security - WiSec'08
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
4
-
-
76649102405
-
Analytical modelling of users' behaviour and performance metrics in key distribution schemes
-
DOI: 10.1002/ett.1389
-
Tornatore M, Giacomazzi P. Analytical modelling of users' behaviour and performance metrics in key distribution schemes. European Transactions on Telecommunications 2010; 21(1): 1-12. DOI: 10.1002/ett.1389. URL http://dx.doi.org/10.1002/ett.1389.
-
(2010)
European Transactions on Telecommunications
, vol.21
, Issue.1
, pp. 1-12
-
-
Tornatore, M.1
Giacomazzi, P.2
-
5
-
-
79953899288
-
On the security of an enhanced UMTS authentication and key agreement protocol
-
DOI: 10.1002/ett.1460
-
Hwang MS, Chong SK, Ou HH. On the security of an enhanced UMTS authentication and key agreement protocol. European Transactions on Telecommunications 2011; 22(3): 99-112. DOI: 10.1002/ett.1460. URL http://dx.doi.org/10.1002/ett.1460.
-
(2011)
European Transactions on Telecommunications
, vol.22
, Issue.3
, pp. 99-112
-
-
Hwang, M.S.1
Chong, S.K.2
Ou, H.H.3
-
9
-
-
49049105964
-
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
-
IEEE: Las Vegas, NA, USA
-
Lee YK, Batina L, Verbauwhede I. EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In IEEE International Conference on RFID 2008. IEEE: Las Vegas,NA,USA, 2008; 97-104.
-
(2008)
IEEE International Conference on RFID 2008
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
10
-
-
58449108568
-
Cryptanalysis of EC-RAC, a RFID identification protocol
-
Franklin MK, Hui LCK, Wong DS (eds), Lecture Notes in Computer Science. Springer: Hong Kong, China
-
Bringer J, Chabanne H, Icart T. Cryptanalysis of EC-RAC, a RFID identification protocol. In 7th International Conference on Cryptology And Network Security - CANS'08, Vol. 5339, Franklin MK, Hui LCK, Wong DS (eds), Lecture Notes in Computer Science. Springer: Hong Kong, China, 2008; 149-161.
-
(2008)
7th International Conference on Cryptology and Network Security - CANS'08
, vol.5339
, pp. 149-161
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
12
-
-
70349268101
-
Untraceable RFID authentication protocols: Revision of EC-RAC
-
IEEE: Orlando,FL,USA
-
Lee YK, Batina L, Verbauwhede I. Untraceable RFID authentication protocols: revision of EC-RAC. In IEEE International Conference on RFID 2009. IEEE: Orlando,FL,USA, 2009; 178-185.
-
(2009)
IEEE International Conference on RFID 2009
, pp. 178-185
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
14
-
-
84872326702
-
Privacy challenges in RFID systems
-
Giusto D, Iera A, Morabito G, Atzori L (eds): Springer New York
-
Lee YK, Batina L, Verbauwhede I. Privacy challenges in RFID systems. In The Internet of Things, Giusto D, Iera A, Morabito G, Atzori L (eds): Springer New York, 2010; 397-407.
-
(2010)
The Internet of Things
, pp. 397-407
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
15
-
-
34547921719
-
-
Syngress: Syngress, Waltham
-
Thornton F, Haines B, Das AM, Bhargava H, Campbell A. RFID Security. Syngress: Syngress, Waltham, 2006.
-
(2006)
RFID Security
-
-
Thornton, F.1
Haines, B.2
Das, A.M.3
Bhargava, H.4
Campbell, A.5
-
16
-
-
74049109627
-
An efficient forward private RFID protocol
-
ACM: New York, NY, USA
-
Berbain C, Billet O, Etrog J, Gilbert H. An efficient forward private RFID protocol. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. ACM: New York, NY, USA, 2009; 43-53.
-
(2009)
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 43-53
-
-
Berbain, C.1
Billet, O.2
Etrog, J.3
Gilbert, H.4
-
18
-
-
38149038702
-
On privacy models for RFID
-
Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg
-
Vaudenay S. On privacy models for RFID. In Advances in Cryptology - Asiacrypt 2007, Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg, 2007; 68-87.
-
(2007)
Advances in Cryptology - Asiacrypt 2007
, pp. 68-87
-
-
Vaudenay, S.1
-
19
-
-
34547687590
-
Defining strong privacy for RFID
-
DOI 10.1109/PERCOMW.2007.37, 4144854, Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
-
Juels A, Weis SA. Defining strong privacy for RFID, In Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on, 2007; 342 -347. (Pubitemid 47214235)
-
(2007)
Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
20
-
-
70349118926
-
Mutual authentication in RFID: Security and privacy
-
ACM Press: Tokyo, Japan
-
Paise RI, Vaudenay S. Mutual authentication in RFID: security and privacy. In ASIACCS'08. ACM Press: Tokyo, Japan, 2008; 292-299.
-
(2008)
ASIACCS'08
, pp. 292-299
-
-
Paise, R.I.1
Vaudenay, S.2
-
22
-
-
79953728671
-
A new framework for RFID privacy
-
Deng RH, Li Y, Yao AC, Yung M, Zhao Y. A new framework for RFID privacy. Cryptology ePrint Archive, Report 2010/059, 2010.
-
(2010)
Cryptology EPrint Archive Report 2010/059
-
-
Deng, R.H.1
Li, Y.2
Yao, A.C.3
Yung, M.4
Zhao, Y.5
-
24
-
-
57049184162
-
RFID privacy models revisited
-
Springer-Verlag: Berlin, Heidelberg
-
Ng CY, Susilo W, Mu Y, Safavi-Naini R. RFID privacy models revisited. In ESORICS '08: Proceedings of the 13th European Symposium on Research in Computer Security. Springer-Verlag: Berlin, Heidelberg, 2008; 251-266.
-
(2008)
ESORICS'08: Proceedings of the 13th European Symposium on Research in Computer Security
, pp. 251-266
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
25
-
-
84885893141
-
Wide-weak privacy-preserving RFID authentication protocols
-
Springer-Verlag: Berlin, Heidelberg
-
Lee YK, Batina L, Singeleé D, Verbauwhede I. Wide-weak privacy-preserving RFID authentication protocols. In International Conference on Mobile Lightweight Wireless Systems. Springer-Verlag: Berlin, Heidelberg, 2010.
-
(2010)
International Conference on Mobile Lightweight Wireless Systems
-
-
Lee, Y.K.1
Batina, L.2
Singeleé, D.3
Verbauwhede, I.4
-
26
-
-
70450265312
-
Cryptanalysis of a new ultralightweight RFID authentication protocolłSASI
-
Phan RCW. Cryptanalysis of a new ultralightweight RFID authentication protocolłSASI. IEEE Transactions on Dependable and Secure Computing 2009; 6(4): 316-320.
-
(2009)
IEEE Transactions on Dependable and Secure Computing
, vol.6
, Issue.4
, pp. 316-320
-
-
Phan, R.C.W.1
|