-
1
-
-
70350399643
-
Secure ownership and ownership transfer in RFID systems
-
T. van Deursen, S. Mauw, S. Radomirovic, and P. Vullers, "Secure ownership and ownership transfer in RFID systems," in Proc. Eur. Symp. Research in Computer Security (ESORICS 2009), Lecture Notes in Computer Science (LNCS), 2009, vol. 5789, pp. 637-654.
-
(2009)
Proc. Eur. Symp. Research in Computer Security (ESORICS 2009), Lecture Notes in Computer Science (LNCS)
, vol.5789
, pp. 637-654
-
-
Van Deursen, T.1
Mauw, S.2
Radomirovic, S.3
Vullers, P.4
-
3
-
-
38149038702
-
On privacy models for RFID
-
S. Vaudenay, "On privacy models for RFID," in Advanced in Cryptology - ASIACRYPT 2007, Lecture Notes in Computer Science, 2007, vol. 4833, pp. 68-87.
-
(2007)
Advanced in Cryptology - ASIACRYPT 2007, Lecture Notes in Computer Science
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
4
-
-
80052972135
-
A new RFID privacy model
-
J. Hermans, A. Pashalidis, F. Vercauteren, and B. Preneel, "A new RFID privacy model," in Proc. Eur. Symp. Research in Computer Security (ESORICS 2011), Lecture Notes in Computer Science, 2011, vol. 6879, pp. 568-587.
-
(2011)
Proc. Eur. Symp. Research in Computer Security (ESORICS 2011), Lecture Notes in Computer Science
, vol.6879
, pp. 568-587
-
-
Hermans, J.1
Pashalidis, A.2
Vercauteren, F.3
Preneel, B.4
-
6
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
A. Juels and S. Weiss, "Authenticating pervasive devices with human protocols," in Proc. Advances in Cryptology (CRYPTO 2005), Lecture Notes in Computer Science, 2005, vol. 3621, pp. 293-308.
-
(2005)
Proc. Advances in Cryptology (CRYPTO 2005), Lecture Notes in Computer Science
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weiss, S.2
-
7
-
-
35348832191
-
An elliptic curve processor suitable for RFID-tags
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, An elliptic curve processor suitable for RFID-tags, Cryptology ePrint Archive, Report 2006/227, 2006.
-
(2006)
Cryptology EPrint Archive, Report 2006/227
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
8
-
-
54049143316
-
Elliptic curve based security processor for RFID
-
Nov
-
Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic curve based security processor for RFID," IEEE Trans. Computers, vol. 57, no. 11, pp. 1514-1527, Nov. 2008.
-
(2008)
IEEE Trans. Computers
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
9
-
-
70449579747
-
Anonymous RFID authentication supporting constant key-lookup against active adversaries
-
Nov
-
M. Burmester, B. de Medeiros, and R. Motta, "Anonymous RFID authentication supporting constant key-lookup against active adversaries," Int. J. Appl. Cryptography, vol. 1, no. 2, pp. 79-90, Nov. 2008.
-
(2008)
Int. J. Appl. Cryptography
, vol.1
, Issue.2
, pp. 79-90
-
-
Burmester, M.1
De Medeiros, B.2
Motta, R.3
-
10
-
-
46749130059
-
A novel mutual authentication scheme based on quadratic residues for RFID systems
-
Aug
-
Y. Chen, J.-S. Chou, and H.-M. Sun, "A novel mutual authentication scheme based on quadratic residues for RFID systems," Comput. Netw., vol. 52, no. 12, pp. 2373-2380, Aug. 2008.
-
(2008)
Comput. Netw.
, vol.52
, Issue.12
, pp. 2373-2380
-
-
Chen, Y.1
Chou, J.-S.2
Sun, H.-M.3
-
11
-
-
80052599286
-
Across-authority lightweight ownership transfer protocol
-
Aug.
-
M. H. Yang, "Across-authority lightweight ownership transfer protocol," Electronic Commerce Res. Applicat., vol. 10, no. 4, pp. 375-383, Aug. 2011.
-
(2011)
Electronic Commerce Res. Applicat.
, vol.10
, Issue.4
, pp. 375-383
-
-
Yang, M.H.1
-
12
-
-
57149100147
-
An efficient and secure RFID security method with ownership transfer
-
K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, "An efficient and secure RFID security method with ownership transfer," in Proc. 2006 Int. Conf. Computational Intelligence and Security, 2006, pp. 1090-1095.
-
(2006)
Proc. 2006 Int. Conf. Computational Intelligence and Security
, pp. 1090-1095
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
13
-
-
84857500576
-
Single RFID tag ownership transfer protocols
-
Mar.
-
G. Kapoor and S. Piramuthu, "Single RFID tag ownership transfer protocols," IEEE Trans. Systems, Man, Cybern. C, Appl. Rev., vol. 42, no. 2, pp. 164-173, Mar. 2012.
-
(2012)
IEEE Trans. Systems, Man, Cybern. C, Appl. Rev.
, vol.42
, Issue.2
, pp. 164-173
-
-
Kapoor, G.1
Piramuthu, S.2
-
14
-
-
79151469014
-
Scalable RFID security protocols supporting tag ownership transfer
-
Apr.
-
B. Song and C. J. Mitchell, "Scalable RFID security protocols supporting tag ownership transfer," Comput. Commun., vol. 34, no. 4, pp. 556-566, Apr. 2011.
-
(2011)
Comput. Commun.
, vol.34
, Issue.4
, pp. 556-566
-
-
Song, B.1
Mitchell, C.J.2
-
15
-
-
59249097693
-
A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags
-
Nov
-
S. Fouladgar and H. Afifi, "A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags," J. Commun., vol. 2, no. 6, pp. 6-13, Nov. 2007.
-
(2007)
J. Commun.
, vol.2
, Issue.6
, pp. 6-13
-
-
Fouladgar, S.1
Afifi, H.2
-
17
-
-
70450162483
-
A new RFID authentication protocol with ownership transfer in an insecure communication environment
-
Aug.
-
C.-H. Wang and S. Chin, "A new RFID authentication protocol with ownership transfer in an insecure communication environment," in Proc. 9th Int. Conf. Hybrid Intelligent Systems, Aug. 2009, pp. 486-491.
-
(2009)
Proc. 9th Int. Conf. Hybrid Intelligent Systems
, pp. 486-491
-
-
Wang, C.-H.1
Chin, S.2
-
18
-
-
77949415170
-
Vulnerabilities in some recently proposed RFID ownership transfer protocols
-
Mar.
-
G. Kapoor and S. Piramuthu, "Vulnerabilities in some recently proposed RFID ownership transfer protocols," IEEE Commun. Lett., vol. 14, no. 3, pp. 260-262, Mar. 2010.
-
(2010)
IEEE Commun. Lett.
, vol.14
, Issue.3
, pp. 260-262
-
-
Kapoor, G.1
Piramuthu, S.2
-
19
-
-
70349120905
-
Enhancement of the RFID security method with ownership transfer
-
Jan.
-
H. Chen, W. Lee, Y. Zhao, and Y. Chen, "Enhancement of the RFID security method with ownership transfer," in Proc. 3rd Int. Conf. Ubiquitous Information Management and Communication (ICUIMC'09), Jan. 2009, pp. 251-254.
-
(2009)
Proc. 3rd Int. Conf. Ubiquitous Information Management and Communication (ICUIMC'09)
, pp. 251-254
-
-
Chen, H.1
Lee, W.2
Zhao, Y.3
Chen, Y.4
-
21
-
-
77953303552
-
Lighweight mutual authentication and ownership transfer for RFID systems
-
Mar.
-
L. Kuseng, Z. Yu, Y. Wei, and Y. Guan, "Lighweight mutual authentication and ownership transfer for RFID systems," in Proc. IEEE INFOCOM 2010, Mar. 2010, pp. 1-5.
-
(2010)
Proc. IEEE INFOCOM 2010
, pp. 1-5
-
-
Kuseng, L.1
Yu, Z.2
Wei, Y.3
Guan, Y.4
-
22
-
-
59249086568
-
A lightweight protocol enabling ownership transfer and granular data access of RFID tags
-
Y. Seo, T. Asano, H. Lee, and K. Kim, "A lightweight protocol enabling ownership transfer and granular data access of RFID tags," in Proc. Symp. Cryptography and Information Security (SCIS'07), 2007, pp. 23-26.
-
(2007)
Proc. Symp. Cryptography and Information Security (SCIS'07)
, pp. 23-26
-
-
Seo, Y.1
Asano, T.2
Lee, H.3
Kim, K.4
-
23
-
-
50249161524
-
SQUASH - AnewMACwith provable security properties for highly constrained devices such as RFID tags
-
A. Shamir, "SQUASH - AnewMACwith provable security properties for highly constrained devices such as RFID tags," Fast Software Encryption, Lecture Notes in Computer Science, vol. 5086, pp. 144-157, 2008.
-
(2008)
Fast Software Encryption, Lecture Notes in Computer Science
, vol.5086
, pp. 144-157
-
-
Shamir, A.1
-
25
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F. Thayer, J. Herzog, and J. Guttman, "Strand spaces: Proving security protocols correct," J. Comput. Security, vol. 7, no. 2/3, pp. 191-230, 1999. (Pubitemid 30524011)
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2
, pp. 191-230
-
-
Thayer, F.1
Herzog, J.2
Herzog Jonathan, C.3
Guttman Joshua, D.4
-
28
-
-
78751647847
-
Securing against brute-force attack: A hash based RFID mutual authenication protocol using a secret value
-
Mar.
-
J.-S. Cho, S.-S. Yeo, and S.-K. Kim, "Securing against brute-force attack: A hash based RFID mutual authenication protocol using a secret value," Comput. Commun., vol. 34, no. 3, pp. 391-397, Mar. 2011.
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 391-397
-
-
Cho, J.-S.1
Yeo, S.-S.2
Kim, S.-K.3
-
29
-
-
84872734396
-
Airbus signs contract for high-memory RFID tags
-
Jan., [Online]
-
R.Wessel, "Airbus signs contract for high-memory RFID tags," RFID J., Jan. 2010 [Online]. Available: http://www.rfidjournal.com/article/ view/7323
-
(2010)
RFID J.
-
-
Wessel, R.1
-
30
-
-
84865710579
-
Large memory RFID system solutions
-
[Online]
-
D. Dressen, "Large memory RFID system solutions," ATMEL Applicat. J., pp. 48-49 [Online]. Available: http://www.atmel.com/dyn/ resources/Prod documents/secrerf-largemem-3-04.pdf
-
ATMEL Applicat. J.
, pp. 48-49
-
-
Dressen, D.1
-
31
-
-
0000653210
-
Selecting cryptographic key sizes
-
DOI 10.1007/s00145-001-0009-4
-
A. K. Lenstra and E. R. Verheul, "Selecting cryptographic key sizes," J. Cryptology, vol. 14, no. 4, pp. 255-293, Jan. 2001. (Pubitemid 33770276)
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
32
-
-
54349101762
-
LAMED-A PRNGfor EPC Class-1Generation-2 RFID specification
-
Jan
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "LAMED-A PRNGfor EPC Class-1Generation-2 RFID specification," Comput. Standards Interfaces, vol. 31, no. 1, pp. 88-97, Jan. 2009.
-
(2009)
Comput. Standards Interfaces
, vol.31
, Issue.1
, pp. 88-97
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
33
-
-
68849120029
-
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
-
Oct
-
H.-Y. Chien and C.-S. Laih, "ECC-based lightweight authentication protocol with untraceability for low-cost RFID," J. Parallel Distrib. Comput., vol. 69, no. 10, pp. 848-853, Oct. 2009.
-
(2009)
J. Parallel Distrib. Comput.
, vol.69
, Issue.10
, pp. 848-853
-
-
Chien, H.-Y.1
Laih, C.-S.2
|