-
2
-
-
2942532031
-
RFID tags: Big Brother in small packages
-
13 January
-
D. McCullagh. RFID tags: Big Brother in small packages. CNet, 13 January 2003.
-
(2003)
CNet
-
-
McCullagh, D.1
-
3
-
-
70349980888
-
Conductive Inkjet-Printed Antennas on Flexible Low-Cost Paper-Based Substrates for RFID and WSN Applications
-
Jun.
-
A. Rida, L. Yang, R. Vyas, and M. M. Tentzeris, "Conductive Inkjet-Printed Antennas on Flexible Low-Cost Paper-Based Substrates for RFID and WSN Applications," IEEE Antennas Propagat. Mag., vol. 51, no. 3, pp. 13-23, Jun. 2009.
-
(2009)
IEEE Antennas Propagat. Mag.
, vol.51
, Issue.3
, pp. 13-23
-
-
Rida, A.1
Yang, L.2
Vyas, R.3
Tentzeris, M.M.4
-
4
-
-
70349088651
-
Location Privacy in RFID Applications
-
C. Bettini, S. Jajodia, P. Samarati, X. S. Wang, (eds.) Privacy in Location-Based Applications, Springer, Heidelberg
-
A. R. Sadeghi, I. Visconti, C. Wachsmann, -"Location Privacy in RFID Applications," In: C. Bettini, S. Jajodia, P. Samarati, X. S. Wang, (eds.) Privacy in Location-Based Applications, volume 5599 of LNCS, Springer, Heidelberg, 2009, pp. 127-150.
-
(2009)
LNCS
, vol.5599
, pp. 127-150
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
5
-
-
71549125572
-
Anonymizer-Enabled Security and Privacy for RFID
-
J. A. Garay, A. Miyaji, A. Otsuka (eds.) CANS 2009, Springer, Heidelberg
-
A. R. Sadeghi, I. Visconti, C. Wachsmann, -"Anonymizer-Enabled Security and Privacy for RFID," In: J. A. Garay, A. Miyaji, A. Otsuka (eds.) CANS 2009, volume 5888 of LNCS, Springer, Heidelberg, 2009, pp. 134-153.
-
(2009)
LNCS
, vol.5888
, pp. 134-153
-
-
Sadeghi, A.R.1
Visconti, I.2
Wachsmann, C.3
-
6
-
-
79957463564
-
Anonymous Authentication for RFID Systems
-
F. Armknecht, L. Chen, A. R. Sadeghi and C. Wachsmann, "Anonymous Authentication for RFID Systems", In 6th Workshop of RFID Security-RFIDSec 10', Istanbul, Turkey, June 2010.
-
6th Workshop of RFID Security-RFIDSec 10', Istanbul, Turkey, June 2010
-
-
Armknecht, F.1
Chen, L.2
Sadeghi, A.R.3
Wachsmann, C.4
-
7
-
-
78650151843
-
On RFID Privacy with Mutual Authentication and Tag Corruption
-
Zhou, J. (ed.) ACNS 2010. Springer, Heidelberg
-
F. Armknecht, A. R. Sadeghi, I. Visconti, C. Waschmann, "On RFID Privacy with Mutual Authentication and Tag Corruption. In: Zhou, J. (ed.) ACNS 2010. LNCS, Vol. 6123, Springer, Heidelberg, 2010, pp. 493-510.
-
(2010)
LNCS
, vol.6123
, pp. 493-510
-
-
Armknecht, F.1
Sadeghi, A.R.2
Visconti, I.3
Waschmann, C.4
-
8
-
-
33749663423
-
RFID malware: Design principles and examples
-
Pervasive and Mobile Computing (November 2006), IEEE
-
M. R. Rieback, P. N. D. Simpson, B. Crispo and A. S. Tanenbaum, "RFID malware: Design principles and examples," In Pervasive and Mobile Computing In Special Issue on PerCom 2006, Vol. 2, No. 4. (November 2006), IEEE, 2006, pp.405-426.
-
(2006)
PerCom 2006
, vol.2
, Issue.4 SPEC. ISSUE
, pp. 405-426
-
-
Rieback, M.R.1
Simpson, P.N.D.2
Crispo, B.3
Tanenbaum, A.S.4
-
9
-
-
1942489982
-
Hacking techniques: The tools that hackers use, and how they are evolving to become sophisticated
-
R. Barber, "Hacking techniques: the tools that hackers use, and how they are evolving to become sophisticated", Computer Fraud and Security, Vol. 2001, Issue 3, 2001, pp. 9-12.
-
(2001)
Computer Fraud and Security
, vol.2001
, Issue.3
, pp. 9-12
-
-
Barber, R.1
-
14
-
-
84977783611
-
Strong and robust RFID authentication enabling perfect ownership transfer
-
P. Ning, S. Qing, and N. Li, editors, Conference on Information and Communications Security - ICICS' 06, Springer-Verlag, Raleigh, North Carolina, USA, December
-
C. Lim and T. Kwon, "Strong and robust RFID authentication enabling perfect ownership transfer." In P. Ning, S. Qing, and N. Li, editors, Conference on Information and Communications Security - ICICS' 06, LNCS, Vol. 4307, Springer-Verlag, Raleigh, North Carolina, USA, December 2006, pp. 1-20.
-
(2006)
LNCS
, vol.4307
, pp. 1-20
-
-
Lim, C.1
Kwon, T.2
-
15
-
-
21644486314
-
-
Trusted Computing Group August 2nd. Specification Revision 1.4
-
Trusted Computing Group (2007, August 2nd). TCG Specification Architecture Overview, Specification Revision 1.4.
-
(2007)
TCG Specification Architecture Overview
-
-
-
16
-
-
34547196300
-
A Protocol for Property-based Attestation
-
L. Chen, R. Landfermann, H. Löhr, M. Rohe, A. R. Sadeghi and C. Stüble, "A Protocol for Property-based Attestation," In Proceedings of the first ACM workshop on Scalable Trusted Computing, 2006, pp. 7-16.
-
Proceedings of the First ACM Workshop on Scalable Trusted Computing, 2006
, pp. 7-16
-
-
Chen, L.1
Landfermann, R.2
Löhr, H.3
Rohe, M.4
Sadeghi, A.R.5
Stüble, C.6
-
18
-
-
38549157185
-
Trusted Computing - Special Aspects and Challenges
-
SOFSEM 2008, High Tetras, January Springer, Slovakia
-
A. Sadeghi, "Trusted Computing - Special Aspects and Challenges," SOFSEM 2008, High Tetras, volume 4910 of LNCS, January 2008, Springer, Slovakia, pp. 98-117.
-
(2008)
LNCS
, vol.4910
, pp. 98-117
-
-
Sadeghi, A.1
-
19
-
-
54249165796
-
-
IBM Press
-
D. Challener, K. Yoder, R. Catherman, D. Safford and L. V. Doorn, "A Practical Guide to Trusted Computing," IBM Press, 2008.
-
(2008)
A Practical Guide to Trusted Computing
-
-
Challener, D.1
Yoder, K.2
Catherman, R.3
Safford, D.4
Doorn, L.V.5
-
20
-
-
33748062337
-
PRIMA: Policy-Reduced Integrity Measurement Architecture
-
ACM Press
-
T. Jaeger, R. Sailer and U. Shankar, "PRIMA: Policy-Reduced Integrity Measurement Architecture," SACMAT '06, ACM Press, 2006, pp. 19-28.
-
(2006)
SACMAT '06
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
21
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
R. Sailer, X. Zhang, T. Jaeger, L. V. Doorn, "Attestation-based policy enforcement for remote access," In Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004, pp. 308-317.
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
, pp. 308-317
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Doorn, L.V.4
-
22
-
-
78650413515
-
Mutual Attestation Using TPM for Trusted RFID Protocol
-
nd International Conference on Network Applications, Protocols and Services-NETAPPS 2010, Kedah, Malaysia, September 2010.
-
nd International Conference on Network Applications, Protocols and Services-NETAPPS 2010, Kedah, Malaysia, September 2010
-
-
Mubarak, M.F.1
Ab Manan, J.2
Yahya, S.3
|