-
1
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
DOI 10.1109/MSP.2005.78
-
A Jules, S Garfinkel, R Pappu, RFID privacy: an overview of problems and proposed solutions. IEEE Security Privacy. 3(3), 34-43 (2005). doi:10.1109/MSP.2005.78 (Pubitemid 40860471)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
2
-
-
33144457479
-
RFID security and privacy: A research survey
-
A Jules, RFID security and privacy: a research survey. IEEE J Sel Areas Commun. 24(2), 1-19 (2006)
-
(2006)
IEEE J Sel Areas Commun.
, vol.24
, Issue.2
, pp. 1-19
-
-
Jules, A.1
-
3
-
-
32844471136
-
An introduction to RFID technology
-
DOI 10.1109/MPRV.2006.2
-
R Want, An introduction to RFID technology. IEEE Pervasive Comput. 5, 25-33 (2005) (Pubitemid 43254240)
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.1
, pp. 25-33
-
-
Want, R.1
-
4
-
-
84872852145
-
WinRFID - A middleware for the enablement of radio frequency identification (RFID) based applications UCLA
-
Los Angeles, CA
-
BS Prabhu, X Su, H Ramamurthy, C Chu, R Gadh, WinRFID - a middleware for the enablement of radio frequency identification (RFID) based applications UCLA, in Wireless Internet for the Mobile Enterprise Consortium (WINMEC), Los Angeles, CA, 1-23 (2003)
-
(2003)
Wireless Internet for the Mobile Enterprise Consortium (WINMEC)
, pp. 1-23
-
-
Prabhu, B.S.1
Su, X.2
Ramamurthy, H.3
Chu, C.4
Gadh, R.5
-
6
-
-
2942556410
-
Radio-frequency identifcation: Security risks and challenges
-
S Sarma, S Weis, D Engels, Radio-frequency identifcation: security risks and challenges. CryptoBytes. 6(1), 2-9 (2003)
-
(2003)
CryptoBytes.
, vol.6
, Issue.1
, pp. 2-9
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
7
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
A Juels, RL Rivest, M Szudlo, The blocker tag: selective blocking of RFID tags for consumer privacy, in the 8th ACM Conference on Computer and Communications Security, (ACM Press, Washington DC, USA, 2003), pp. 103-111 (Pubitemid 40673793)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
8
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Lecture Notes in Computer Science, doi:10.1007/978-3-540-39881-3-18
-
SA Weis, SE Sarma, RL Rivest, DW Engels, Security and privacy aspects of low-cost radio frequency identification systems, in Security in Pervasive Computing, vol. 2802. (Lecture Notes in Computer Science, 2004), pp. 201-212. doi:10.1007/978-3-540-39881-3-18
-
(2004)
Security in Pervasive Computing
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
9
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
-
DOI 10.1016/j.csi.2006.04.004, PII S092054890600064X
-
H Chien, C Chen, Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Comput Standard Interface. 29(2), 254-259 (2007). doi:10.1016/j.csi.2006.04.004 (Pubitemid 44829930)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
10
-
-
24944575863
-
Cryptographic approach to "privacyfriendly" tags
-
MA, USA, November
-
M Ohkubo, K Suzki, S Kinoshita, Cryptographic approach to "privacyfriendly" tags, in RFID Privacy Workshop, MIT, MA, USA http://rfidprivacy media.mit.edu/2003/papers/ohkubo.pdf (November 2003)
-
(2003)
RFID Privacy Workshop, MIT
-
-
Ohkubo, M.1
Suzki, K.2
Kinoshita, S.3
-
11
-
-
2942625823
-
Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers
-
Sandhu R, Thomas R IEEE Computer Society, Orlando, FL, USA, March
-
D Henrici, P Muller, Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers. in International Workshop on Pervasive Computing and Communication Security-PerSec 2004, ed. by Sandhu R, Thomas R IEEE Computer Society, Orlando, FL, USA 149-153 (March 2004)
-
(2004)
International Workshop on Pervasive Computing and Communication Security-PerSec 2004
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
12
-
-
24944582157
-
Efficient authentication for low-cost RFID systems
-
LNCS Springer-Verlas
-
SM Lee, YJ Hwang, DH Lee, JI Lim, Efficient authentication for low-cost RFID systems, in ICCSA05, LNCS, vol. 3480. (Springer-Verlag, 2005), pp. 619-629
-
(2005)
ICCSA05
, vol.3480
, pp. 619-629
-
-
Lee, S.M.1
Hwang, Y.J.2
Lee, D.H.3
Lim, J.I.4
-
14
-
-
14844294769
-
Privacy and security in library RFID issues, practices, and architectures
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
D Molnar, D Wagner, Privacy and Security in Library RFID: Issues, Practices, and Architectures, in Conference on Computer and Communications Security ed. by Pfitzmann B, Liu P (ACM CCS, Washington, DC, USA, 2004), pp. 210-219. ACM Press (Pubitemid 40338202)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
15
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
-
K Rhee, J Kwak, S Kim, D Won, Challenge-response based RFID authentication protocol for distributed database environment. SPC 2005, LNCS 3450 70-84 (2005) (Pubitemid 41274193)
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
16
-
-
33744940544
-
Efficient RFID authentication protocol for ubiquitous computing environment
-
Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings LNCS
-
EY Choi, SM Lee, DH Lee, Efficient RFID authentication protocol for ubiquitous computing environment. Embed Ubiquit Comput. 3832, 945-954 (2005) (Pubitemid 43848772)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3823
, pp. 945-954
-
-
Choi, E.Y.1
Lee, S.M.2
Lee, D.H.3
-
17
-
-
38549103545
-
Security analysis and enhancement of One-way Hash based Low-Cost Authentication Protocol (OHLCAP)
-
Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers LNAI
-
J Ha, S Moon, JMG Nieto, C Boyd, Security analysis and enhancement of one-way hash based low-cost authentication protocol. Emerging Technol Knowl Disc Data Mining. 4819, 574-583 (2007). doi:10.1007/978-3-540-77018-3-57 (Pubitemid 351153026)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4819
, pp. 574-583
-
-
Ha, J.1
Moon, S.2
Nieto, J.M.G.3
Boyd, C.4
-
18
-
-
38149050502
-
A family of dunces: Trivial RFID identification and authentication protocols
-
Lecture Notes in Computer Science, ed. by Borisov N, Golle P Ottawa, Canada, Springer-Verlag, Berlin
-
G Tsudik, A family of dunces: trivial RFID identification and authentication protocols, in 7th International Symposium on Privacy Enhancing Technologies-PET 2007, Lecture Notes in Computer Science, vol. 4776, ed. by Borisov N, Golle P (Ottawa, Canada, 2007), pp. 45-61. Springer-Verlag, Berlin
-
(2007)
7th International Symposium on Privacy Enhancing Technologies-PET 2007
, vol.4776
, pp. 45-61
-
-
Tsudik, G.1
-
19
-
-
33745938362
-
RFID security without extensive cryptography
-
DOI 10.1145/1102219.1102229, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
-
S Karthikeyan, N Nesterenko, RFID security without extensive cryptography, in Workshop on Security of Ad Hoc and Sensor Networks - SASN05, (Alexandria, Virginia, USA, 2005), pp. 63-67. ACM Press (Pubitemid 44059931)
-
(2005)
SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
, vol.2005
, pp. 63-67
-
-
Karthikeyan, S.1
Nesterenko, M.2
-
20
-
-
56749103027
-
-
WiSEC'08, Alexandria, Virginia, USA
-
B Song, CJ Mitchell, RFID authentication protocol for low-cost tags, (WiSEC'08, Alexandria, Virginia, USA, 2008), pp. 140-147
-
(2008)
RFID Authentication Protocol for Low-cost Tags
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
21
-
-
78149486773
-
RFID tag ownership transfer
-
Budaperst, Hungary
-
B Song, RFID tag ownership transfer, in 4thWorkshop on RFID Security, RFIDsec08, (Budaperst, Hungary, 2008), p. 16
-
(2008)
4thWorkshop on RFID Security, RFIDsec08
, pp. 16
-
-
Song, B.1
-
22
-
-
70349155465
-
Attacks and improvements to an RFID mutual authentication protocol and its extensions
-
Zurich, Switzerland
-
S Cai, Y Li, T Li, RH Deng, Attacks and improvements to an RFID mutual authentication protocol and its extensions, in WiSec'09, (Zurich, Switzerland, 2009), pp. 51-58
-
(2009)
WiSec'09
, pp. 51-58
-
-
Cai, S.1
Li, Y.2
Li, T.3
Deng, R.H.4
-
23
-
-
84255210175
-
A two-way RFID authentication protocol in pervasive computing
-
Birmingham University, UK
-
MM Morshed, H Yu, A Atkins, SI Ahamed, MM Akbar, A two-way RFID authentication protocol in pervasive computing, in The 16th International Conference on Automation and Computing (ICAC10), (Birmingham University, UK, 2010), pp. 164-169
-
(2010)
The 16th International Conference on Automation and Computing (ICAC10)
, pp. 164-169
-
-
Morshed, M.M.1
Yu, H.2
Atkins, A.3
Ahamed, S.I.4
Akbar, M.M.5
|