-
3
-
-
33144457479
-
Rfid security and privacy: A research survey
-
Juels
-
Juels, 2006. "Rfid security and privacy: A research survey," IEEE Journal on Selected Areas in Communication, 24(2): 381-394.
-
(2006)
IEEE Journal On Selected Areas In Communication
, vol.24
, Issue.2
, pp. 381-394
-
-
-
5
-
-
20444478767
-
Flexible blocker tags on the cheap
-
Juels and J. Brainard, 2004. Soft blocking, S.DeCapitani di Vimercati and P. Syverson, Eds
-
Juels and J. Brainard, 2004. Soft blocking: Flexible blocker tags on the cheap, in Proc. Workshop on Privacy in the Electronic Society, S.DeCapitani di Vimercati and P. Syverson, Eds., pp: 1-7.
-
Proc. Workshop On Privacy In the Electronic Society
, pp. 1-7
-
-
-
6
-
-
20444432411
-
-
S. De Capitani di Vimercati and P. Syverson, Eds
-
Good, N., J. Han, E. Miles, D. Molnar, D. Mulligan, L. Quilter, J. Urban and D. Wagner, 2004. Radio frequency identification and privacy with information goods, in Proc. Workshop on Privacy in the Electronic Society-WPES, S. De Capitani di Vimercati and P. Syverson, Eds., pp: 41-42.
-
(2004)
Radio Frequency Identification and Privacy With Information Goods, In Proc. Workshop On Privacy In the Electronic Society-WPES
, pp. 41-42
-
-
Good, N.1
Han, J.2
Miles, E.3
Molnar, D.4
Mulligan, D.5
Quilter, L.6
Urban, J.7
Wagner, D.8
-
7
-
-
33144466214
-
RFID privacy using user-controllable uniqueness, in Proc
-
Inoue, S. and H. Yasuura, 2003. RFID privacy using user-controllable uniqueness, in Proc. RFID Privacy Workshop.
-
(2003)
RFID Privacy Workshop
-
-
Inoue, S.1
Yasuura, H.2
-
8
-
-
35248832722
-
-
in Proc. Financial Cryptography, R.Wright, Ed. New York: Springer-Verlag, 2742, Lecture Notes in Computer Science
-
Juels and R. Pappu, 2003. Squealing Euros: Privacy protection in RFID enabled banknotes, in Proc. Financial Cryptography, R.Wright, Ed. New York: Springer-Verlag, 2742, Lecture Notes in Computer Science, pp: 103-121.
-
(2003)
Squealing Euros: Privacy Protection In RFID Enabled Banknotes
, pp. 103-121
-
-
Juels1
Pappu, R.2
-
9
-
-
26444435642
-
RFID Guardian: A battery-powered mobile device for RFID privacy management
-
C. Boyd and J.M. González Nieto, Eds. New York: Springer-Verlag, vol. 3574, Lecture Notes in Computer Science
-
Rieback, M., B. Crispo and A. Tanenbaum, 2005. RFID Guardian: A battery-powered mobile device for RFID privacy management, in Proc. Australasian Conf. Inf. Security and Privacy, C. Boyd and J.M. González Nieto, Eds. New York: Springer-Verlag, vol. 3574, Lecture Notes in Computer Science, pp: 184-194.
-
(2005)
Proc. Australasian Conf. Inf. Security and Privacy
, pp. 184-194
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
11
-
-
77953296741
-
Counting RFID tags efficiently and anonymously
-
Han, H., B. Sheng, C. Tan, Q. Li, W. Mao and S. Lu, 2010. Counting RFID tags efficiently and anonymously, in proc of IEEE INFOCOM.
-
(2010)
In Proc of IEEE INFOCOM
-
-
Han, H.1
Sheng, B.2
Tan, C.3
Li, Q.4
Mao, W.5
Lu, S.6
-
12
-
-
79960865584
-
-
Luo, W., S. Chen, T. Li and S. Chen, 2011. Efficient missing tag detection in RFID systems, in proc of IEEE INFOCOM.
-
(2011)
Efficient Missing Tag Detection In RFID Systems, In Proc of IEEE INFOCOM
-
-
Luo, W.1
Chen, S.2
Li, T.3
Chen, S.4
-
15
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
In Marc Joye and Jean-Jacques Quisquater, 357{370, Boston, Massachusetts, USA, IACR, Springer
-
Feldhofer, M., S. Dominikus and J. Wolkerstorfer, 2004. Strong authentication for RFID systems using the AES algorithm. In Marc Joye and Jean-Jacques Quisquater, editors, Workshop on Cryptographic Hardware and Embedded Systems {CHES 2004, volume 3156 of Lecture Notes in Computer Science, 357{370, Boston, Massachusetts, USA, IACR, Springer.
-
(2004)
Workshop On Cryptographic Hardware and Embedded Systems {CHES 2004, Volume 3156 of Lecture Notes In Computer Science
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
16
-
-
35348832191
-
-
Cryptology ePrint Archive, Report 2006/227, 2006. Available from: eprint. iacr.org/2006/227.pdf
-
Batina, L., J. Guajardo, T. Kerins, N. Mentens, P. Tuyls and I. Verbauwhede, 2006. An elliptic curve processor suitable for RFID-tags. Cryptology ePrint Archive, Report 2006/227, 2006. Available from: eprint. iacr.org/2006/227.pdf.
-
(2006)
An Elliptic Curve Processor Suitable For RFID-tags
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
17
-
-
51249097438
-
RFID and privacy
-
In Milan Petkovic and Willem Jonker, editors, Springer, Berlin Heidelberg New York
-
Langheinrich, M., 2007. RFID and privacy. In Milan Petkovic and Willem Jonker, editors, Security, Privacy and Trust in Modern Data Management, pages 433-450. Springer, Berlin Heidelberg New York.
-
(2007)
Security, Privacy and Trust In Modern Data Management
, pp. 433-450
-
-
Langheinrich, M.1
-
20
-
-
77956902162
-
-
Ahsan, K., H. Shah and P. Kingston, 2010. RFID Applications: An Introductory and Exploratory Study International Journal of Computer Science, 7(1): 1-7.
-
(2010)
RFID Applications: An Introductory and Exploratory Study International Journal of Computer Science
, vol.7
, Issue.1
, pp. 1-7
-
-
Ahsan, K.1
Shah, H.2
Kingston, P.3
-
21
-
-
84878982961
-
-
Security Vulnerabilities and Countermeasures Supply Chain the Way to Flat Organization, Publisher-Intech
-
Xiao, Q., T. Gibbsons and H. Lebrun, 2009. RFID Technology, Security Vulnerabilities and Countermeasures Supply Chain the Way to Flat Organization, Publisher-Intech, pp: 357-382.
-
(2009)
RFID Technology
, pp. 357-382
-
-
Xiao, Q.1
Gibbsons, T.2
Lebrun, H.3
-
25
-
-
34548842212
-
-
Rida, A., R. Vyas, T. Wu, R. Li and M.M. Tentzeris, 2010. Devlopment and Implementation of Novel UHF Paper-Based RFID designs for Anti-Counterfeiting and Security Applications IEEE, 71: 52-56.
-
(2010)
Devlopment and Implementation of Novel UHF Paper-Based RFID Designs For Anti-Counterfeiting and Security Applications IEEE
, vol.71
, pp. 52-56
-
-
Rida, A.1
Vyas, R.2
Wu, T.3
Li, R.4
Tentzeris, M.M.5
-
27
-
-
78649658954
-
-
Liu, L., Z. Chen, L. Yang, Yi Lu and H. Wang, 2010. Research on the Security Issues of RFID-based Supply Chain, in the proceedings of IEEE International Conference on E-Business and E-Government.
-
(2010)
Research On the Security Issues of RFID-based Supply Chain, In the Proceedings of IEEE International Conference On E-Business and E-Government
-
-
Liu, L.1
Chen, Z.2
Yang, L.3
Yi, L.4
Wang, H.5
|