-
2
-
-
33751546328
-
Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards
-
Chien, H.Y., Chen, C.H.: Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Computers Standards and Interfaces 29(2), 254-259 (2007)
-
(2007)
Computers Standards and Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.Y.1
Chen, C.H.2
-
3
-
-
36248949547
-
Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning
-
Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning. In: Proc. 2006 Symp. Cryptography and Information Security (2006)
-
(2006)
Proc. 2006 Symp. Cryptography and Information Security
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
5
-
-
77957851534
-
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
-
Yeh, T., Wang, Y., Kuo, T., Wang, S.: Securing RFID systems conforming to EPC Class 1 Generation 2 standard. Expert Systems with Applications 37, 7678-7683 (2010)
-
(2010)
Expert Systems With Applications
, vol.37
, pp. 7678-7683
-
-
Yeh, T.1
Wang, Y.2
Kuo, T.3
Wang, S.4
-
6
-
-
77952285870
-
Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements
-
Chien, H.Y., Huang, C.W.: Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements. ACM Operating System Rev. 41(2), 83-86 (2007)
-
(2007)
ACM Operating System Rev
, vol.41
, Issue.2
, pp. 83-86
-
-
Chien, H.Y.1
Huang, C.W.2
-
7
-
-
36248977046
-
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
-
In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.), Springer, Boston
-
Li, T., Wang, G.: Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 109-120. Springer, Boston (2007)
-
(2007)
New Approaches For Security, Privacy and Trust In Complex Environments. IFIP
, vol.232
, pp. 109-120
-
-
Li, T.1
Wang, G.2
-
8
-
-
36248971663
-
LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags. In: Proc. Second Workshop RFID Security (July 2006)
-
(2006)
Proc. Second Workshop RFID Security
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
9
-
-
33845455482
-
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags
-
In: Meersman, R., Tari, Z., Herrero, P. (eds.), Springer, Heidelberg
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM Workshops 2006. LNCS, vol. 4277, pp. 352-361. Springer, Heidelberg (2006)
-
(2006)
OTM Workshops 2006. LNCS
, vol.4277
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
10
-
-
33750067948
-
2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags
-
In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.), Springer, Heidelberg
-
2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 912-923. Springer, Heidelberg (2006)
-
(2006)
UIC 2006. LNCS
, vol.4159
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
11
-
-
36248982045
-
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity
-
Chien, H.Y.: SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Trans. Dependable and Secure Computing 4(4), 337-340 (2007)
-
(2007)
IEEE Trans. Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.Y.1
-
12
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.), Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing 2003. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
-
(2004)
Security In Pervasive Computing 2003. LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
14
-
-
41549156956
-
A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection
-
In: Chen, L., Mu, Y., Susilo, W. (eds.), Springer, Heidelberg
-
Lim, J., Oh, H., Kim, S.-J.: A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 278-289. Springer, Heidelberg (2008)
-
(2008)
ISPEC 2008. LNCS
, vol.4991
, pp. 278-289
-
-
Lim, J.1
Oh, H.2
Kim, S.-J.3
-
15
-
-
67349277179
-
A privacy and authentication protocol for passive RFID tags
-
Liu, A.X., Bailey, L.R.A.: A privacy and authentication protocol for passive RFID tags. Computer Communications 32, 1194-1199 (2009)
-
(2009)
Computer Communications
, vol.32
, pp. 1194-1199
-
-
Liu, A.X.1
Bailey, L.R.A.2
-
16
-
-
57049150751
-
A study on secure RFID mutual authentication scheme in pervasive
-
Kang, S.Y., Lee, D.G., Lee, I.Y.: A study on secure RFID mutual authentication scheme in pervasive. Computer Communications 31, 4248-4254 (2008)
-
(2008)
Computer Communications
, vol.31
, pp. 4248-4254
-
-
Kang, S.Y.1
Lee, D.G.2
Lee, I.Y.3
-
17
-
-
78751647847
-
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
-
Cho, J.S., Yeo, S.S., Kim, S.K.: Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. Computer Communications 34, 391-397 (2011)
-
(2011)
Computer Communications
, vol.34
, pp. 391-397
-
-
Cho, J.S.1
Yeo, S.S.2
Kim, S.K.3
-
18
-
-
33847249519
-
Security and Privacy Issues in E-Passports
-
Juels, A., Molner, D., Wagner, D.: Security and Privacy Issues in E-Passports. In: Proc. First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks, Secure-Comm 2005 (2005)
-
(2005)
Proc. First Int'l Conf. Security and Privacy For Emerging Areas In Comm. Networks, Secure-Comm 2005
-
-
Juels, A.1
Molner, D.2
Wagner, D.3
-
19
-
-
49049102047
-
Robust, anonymous RFID authentication with constant key-lookup
-
Burmester, M., Medeiros, B., Motta, R.: Robust, anonymous RFID authentication with constant key-lookup. Cryptology ePrint Archive: listing for 2007 (2007/402) (2007)
-
(2007)
Cryptology EPrint Archive: Listing For 2007 (2007/402)
-
-
Burmester, M.1
Medeiros, B.2
Motta, R.3
-
20
-
-
33646812572
-
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
-
Gaubatz, G., Kaps, J.P., Ozturk, E., Sunar, B.: State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. In: Proc. in the Third IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOMW 2005 (2005)
-
(2005)
Proc. In the Third IEEE International Conference On Pervasive Computing and Communications Workshops, PERCOMW 2005
-
-
Gaubatz, G.1
Kaps, J.P.2
Ozturk, E.3
Sunar, B.4
-
21
-
-
53749094694
-
Public key cryptography based privacy preserving multi-context RFID infrastructure
-
Kaya, S.V., Savas, E., Levi, A., Erçetin, Ö.: Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Networks 7, 136-152 (2009)
-
(2009)
Ad Hoc Networks
, vol.7
, pp. 136-152
-
-
Kaya, S.V.1
Savas, E.2
Levi, A.3
Erçetin, Ö.4
-
22
-
-
54049143316
-
Elliptic-Curve-Based Security Processor for RFID
-
Lee, Y.K., Sakiyama, K., Verbauwhede, I.: Elliptic-Curve-Based Security Processor for RFID. IEEE Trans. on Computers 11(57) (November 2008)
-
(2008)
IEEE Trans. On Computers
, vol.11
, Issue.57
-
-
Lee, Y.K.1
Sakiyama, K.2
Verbauwhede, I.3
-
23
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203-209 (1987)
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
24
-
-
38549133187
-
-
Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security analysis of a cryptographically enabled RFID device. Pre-print, http://www.rfidanalysis.org (May 4, 2006)
-
(2006)
Security Analysis of a Cryptographically Enabled RFID Device
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
26
-
-
46749130059
-
A novel mutual authentication scheme based on quadratic residues
-
Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues. Computer Networks 52, 2373-2380 (2008)
-
(2008)
Computer Networks
, vol.52
, pp. 2373-2380
-
-
Chen, Y.1
Chou, J.S.2
Sun, H.M.3
-
27
-
-
77949562527
-
Cryptanalysis of some RFID authentication protocols
-
Cao, T., Shen, P.: Cryptanalysis of some RFID authentication protocols. Journal of Communications 3(7) (December 2008)
-
(2008)
Journal of Communications
, vol.3
, Issue.7
-
-
Cao, T.1
Shen, P.2
-
28
-
-
78751649779
-
Improvement of the RFID authentication scheme based on quadratic residues
-
Yeh, T.C., Wua, C.H., Tseng, Y.M.: Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications 34, 337-341 (2011)
-
(2011)
Computer Communications
, vol.34
, pp. 337-341
-
-
Yeh, T.C.1
Wua, C.H.2
Tseng, Y.M.3
-
29
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203-209 (1987)
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
30
-
-
33745654539
-
RFID-Tags for Anti-counterfeiting
-
In: Pointcheval, D. (ed.), Springer, Heidelberg
-
Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
-
(2006)
CT-RSA 2006. LNCS
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
31
-
-
49049105964
-
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
-
Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol. In: IEEE International Conference on RFID, pp. 97-104 (2008)
-
(2008)
IEEE International Conference On RFID
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
32
-
-
34547688845
-
Public-Key Cryptography for RFID-tags
-
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-Key Cryptography for RFID-tags. In: Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 217-222 (2007)
-
(2007)
Fifth IEEE International Conference On Pervasive Computing and Communications Workshops
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
33
-
-
0000537828
-
Efficient Identification and Signatures for Smart Cards
-
In: Brassard, G. (ed.), Springer, Heidelberg
-
Schnorr, C.-P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239-252. Springer, Heidelberg (1990)
-
(1990)
CRYPTO 1989. LNCS
, vol.435
, pp. 239-252
-
-
Schnorr, C.-P.1
-
34
-
-
84875762817
-
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
-
In: Brickell, E.F. (ed.), Springer, Heidelberg
-
Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
-
(1993)
CRYPTO 1992. LNCS
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
36
-
-
58449108568
-
Cryptanalysis of EC-RAC, a RFID Identification Protocol
-
In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.), Springer, Heidelberg
-
Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID Identification Protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 149-161. Springer, Heidelberg (2008)
-
(2008)
CANS 2008. LNCS
, vol.5339
, pp. 149-161
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
|