-
2
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
DOI 10.1109/TDSC.2007.70226
-
Chien H-Y. SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340. (Pubitemid 350125898)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
3
-
-
51049092732
-
Hash functions and RFID tags: Mind the gap
-
Bogdanov A, Leander G, Paar C, Poschmann A, Robshaw M, Seurin Y. Hash functions and RFID tags: Mind the gap. Lecture Notes in Computer Science, 2008, 5154: 283-299.
-
(2008)
Lecture Notes in Computer Science
, vol.5154
, pp. 283-299
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.5
Seurin, Y.6
-
4
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
Juels A, Weis S A. Authenticating pervasive devices with human protocols. Lecture Notes in Computer Science, 2005, 3126: 293-308.
-
(2005)
Lecture Notes in Computer Science
, vol.3126
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
6
-
-
34548814766
-
Strong crypto for RFID tags - A comparison of low-power hardware implementations
-
4253019, 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007
-
Feldhofer M,Wolkerstorfer J. Strong crypto for RFID tags- A comparison of low-power hardware implementations. In: Proceedings of IEEE International Symposium on Circuits and Systems, 2007: 1839-1842. (Pubitemid 47448889)
-
(2007)
Proceedings - IEEE International Symposium on Circuits and Systems
, pp. 1839-1842
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
-
7
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Weis S, Sarma S, Rivest R, Engels D. Security and privacy aspects of low-cost radio frequency identification systems. Lecture Notes in Computer Science, 2004, 2802: 201-212.
-
(2004)
Lecture Notes in Computer Science
, vol.2802
, pp. 201-212
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
9
-
-
41549156956
-
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
-
DOI 10.1007/978-3-540-79104-1-20, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings
-
Lim J, Kim S, Oh H. A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection. Lecture Notes in Computer Science, 2008, 4991: 278-289. (Pubitemid 351465332)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4991
, pp. 278-289
-
-
Lim, J.1
Oh, H.2
Kim, S.3
-
10
-
-
67651097814
-
Efficient RFID search protocols using counters
-
Kim S, Lim J, Han J, Oh H. Efficient RFID search protocols using counters. IEICE Transactions on Communications, 2008, E91-B(11): 3552-3559.
-
(2008)
IEICE Transactions on Communications
, vol.E91-B
, Issue.11
, pp. 3552-3559
-
-
Kim, S.1
Lim, J.2
Han, J.3
Oh, H.4
-
14
-
-
67649484364
-
A Gen2-based RFID authentication protocol for security and privacy
-
Sun H, Ting W. A Gen2-based RFID authentication protocol for security and privacy. IEEE Transactions on Mobile Computing, 2009, 8(8): 1052-1062.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.8
, pp. 1052-1062
-
-
Sun, H.1
Ting, W.2
-
15
-
-
84865472816
-
Security flaws in a recent ultralightweight RFID protocol
-
Peris-Lopez P, Hernandez-Castro J C, Tapiador J M E, van der Lubbe J C A. Security flaws in a recent ultralightweight RFID protocol. In: Proceedings of Workshop on RFID Security 2010, 2010, 4: 83-94.
-
(2010)
Proceedings of Workshop on RFID Security 2010
, vol.4
, pp. 83-94
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Tapiador, J.M.E.3
Van Der Lubbe, J.C.A.4
-
16
-
-
85008055668
-
Secure and serverless RFID authentication and search protocols
-
Tan C C, Sheng B, Li Q. Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications, 2008, 7(3): 1400-1407.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.3
, pp. 1400-1407
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
17
-
-
51349134046
-
S3PR: Secure serverless search protocols for RFID
-
Ahamed S I, Rahman F, Hoque E, Kawsar F, Nakajima T. S3PR: Secure serverless search protocols for RFID. In: Proceedings of Information Security and Assurance 2008, 2008: 187-192.
-
(2008)
Proceedings of Information Security and Assurance
, vol.2008
, pp. 187-192
-
-
Ahamed, S.I.1
Rahman, F.2
Hoque, E.3
Kawsar, F.4
Nakajima, T.5
-
18
-
-
63149152263
-
Strong authentication protocol for secure RFID tag search without help of central database
-
Won T, Chun J, Lee D. Strong authentication protocol for secure RFID tag search without help of central database. In: Proceedings of Embedded and Ubiquitous Computing, 2008, 2: 153-158.
-
(2008)
Proceedings of Embedded and Ubiquitous Computing
, vol.2
, pp. 153-158
-
-
Won, T.1
Chun, J.2
Lee, D.3
|