-
2
-
-
77956578953
-
Scalable rfid systems: A privacy-preserving protocol with constant-time identification
-
B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification," Proc. 40th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks, 2010.
-
(2010)
Proc. 40th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
4
-
-
84883161487
-
-
technical report
-
B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "Adversary Model for Radio Frequency Identification," technical report, 2005.
-
(2005)
Adversary Model for Radio Frequency Identification
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
5
-
-
84883189684
-
-
PhD dissertation, Ecole Polytechnique Federale de Lausanne
-
B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, "Cryptography in Radio Frequency Identification and Fair Exchange Protocols," PhD dissertation, Ecole Polytechnique Federale de Lausanne, 2005.
-
(2005)
Cryptography in Radio Frequency Identification and Fair Exchange Protocols
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
6
-
-
47749092385
-
Group-based private authentication
-
G. Avoine, L. Buttyán, T. Holczer, and I. Vajda, "Group-Based Private Authentication," Proc. IEEE Int'l Workshop Trust, Security, and Privacy for Ubiquitous Computing (TSPUC '07), 2007.
-
(2007)
Proc. IEEE Int'l Workshop Trust, Security, and Privacy for Ubiquitous Computing (TSPUC '07)
-
-
Avoine, G.1
Buttyán, L.2
Holczer, T.3
Vajda, I.4
-
11
-
-
74049109627
-
An efficient forward private rfid protocol
-
C. Berbain, O. Billet, J. Etrog, and H. Gilbert, "An Efficient Forward Private RFID Protocol," Proc. Conf. Computer and Comm. Security (CCS '09), 2009.
-
(2009)
Proc. Conf. Computer and Comm. Security (CCS '09)
-
-
Berbain, C.1
Billet, O.2
Etrog, J.3
Gilbert, H.4
-
14
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B.H. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, vol. 37, pp. 422-426, 1970.
-
(1970)
Comm. ACM
, vol.37
, pp. 422-426
-
-
Bloom, B.H.1
-
16
-
-
84883143649
-
Cryptanalysis of ec-rac, a rfid identification protocol
-
J. Bringer, H. Chabanne, and T. Icart, "Cryptanalysis of EC-RAC, a RFID Identification Protocol," Proc. Seventh Int'l Conf. Cryptology and Network Security (CANS '08), 2008.
-
(2008)
Proc. Seventh Int'l Conf. Cryptology and Network Security (CANS '08)
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
17
-
-
0035015894
-
Using multiple hash functions to improve ip lookups
-
A. Broder and M. Mitzenmacher, "Using Multiple Hash Functions to Improve IP Lookups," Proc. IEEE INFOCOM, 2001.
-
(2001)
Proc. IEEE INFOCOM
-
-
Broder, A.1
Mitzenmacher, M.2
-
19
-
-
76849106311
-
Universally composable rfid identification and authentication protocols
-
article 21
-
M. Burmester, T.v. Le, and B. de Medeiros, "Universally Composable RFID Identification and Authentication Protocols," ACM Trans. Information and System Security, vol. 12, article 21, 2009.
-
(2009)
ACM Trans. Information and System Security
, vol.12
-
-
Burmester, M.1
Le, T.V.2
De Medeiros, B.3
-
25
-
-
70350572865
-
Conformation of epc class 1 generation 2 standards rfid system with mutual authentication and privacy protection
-
C.-L. Chen and Y.-Y. Deng, "Conformation of EPC Class 1 Generation 2 Standards RFID System with Mutual Authentication and Privacy Protection," Eng. Applications of Artificial Intelligence, vol. 22, pp. 1284-1291, 2009.
-
(2009)
Eng. Applications of Artificial Intelligence
, vol.22
, pp. 1284-1291
-
-
Chen, C.-L.1
Deng, Y.-Y.2
-
26
-
-
84858987184
-
Reducing rfid reader load with the meet-in-the-middle strategy
-
J.H. Cheon, J. Hong, and G. Tsudik, "Reducing RFID Reader Load with the Meet-in-the-Middle Strategy," J. Comm. and Networks, vol. 14, pp. 10-14, 2012.
-
(2012)
J. Comm. and Networks
, vol.14
, pp. 10-14
-
-
Cheon, J.H.1
Hong, J.2
Tsudik, G.3
-
27
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
DOI 10.1109/TDSC.2007.70226
-
H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 4, pp. 337-340, Oct.-Dec. 2007. (Pubitemid 350125898)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
28
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
-
DOI 10.1016/j.csi.2006.04.004, PII S092054890600064X
-
H.-Y. Chien and C.-H. Chen, "Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards," Computer Standards & Interfaces, vol. 29, pp. 254-259, 2007. (Pubitemid 44829930)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
30
-
-
0017501281
-
Exhaustive cryptanalysis of the nbs data encryption standard
-
W. Diffie and M. Hellman, "Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard," Computer, vol. 10, no. 6, pp. 74-84, June 1977. (Pubitemid 8574342)
-
(1977)
Computer
, vol.10
, Issue.6
, pp. 74-84
-
-
Diffie, W.1
Hellman Martin, E.2
-
33
-
-
79952915179
-
Using hb family of protocols for privacy-preserving authentication of rfid tags in a population
-
T. Halevi, N. Saxena, and S. Halevi, "Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population," Proc. Workshop RFID Security (RFIDSec '09), 2009.
-
(2009)
Proc. Workshop RFID Security (RFIDSec '09)
-
-
Halevi, T.1
Saxena, N.2
Halevi, S.3
-
34
-
-
64249134316
-
Vulnerability of an rfid authentication protocol conforming to epc class 1 generation 2 standards
-
D. Han and D. Kwon, "Vulnerability of an RFID Authentication Protocol Conforming to EPC Class 1 Generation 2 Standards," Computer Standards Interfaces, vol. 31, pp. 648-652, 2009.
-
(2009)
Computer Standards Interfaces
, vol.31
, pp. 648-652
-
-
Han, D.1
Kwon, D.2
-
36
-
-
0019038335
-
A cryptanalytic time-memory trade-off
-
July
-
M. Hellman, "A Cryptanalytic Time-Memory Trade-Off," IEEE Trans. Information Theory, vol. 26, no. 4, pp. 401-406, July 1980.
-
(1980)
IEEE Trans. Information Theory
, vol.26
, Issue.4
, pp. 401-406
-
-
Hellman, M.1
-
43
-
-
50149108262
-
-
NIST Special Publication 800-98
-
T. Karygiannis, B. Eydt, G. Barber, L. Bunn, and T. Phillips, "Guidelines for Securing Radio Frequency Identification (RFID) Systems," NIST Special Publication 800-98, 2007.
-
(2007)
Guidelines for Securing Radio Frequency Identification (RFID) Systems
-
-
Karygiannis, T.1
Eydt, B.2
Barber, G.3
Bunn, L.4
Phillips, T.5
-
44
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password Authentication with Insecure Communication," Comm. ACM, vol. 24, pp. 770-771, 1981.
-
(1981)
Comm. ACM
, vol.24
, pp. 770-771
-
-
Lamport, L.1
-
45
-
-
70449492478
-
A new ultralightweight rfid protocol with mutual authentication
-
Y.-C. Lee, Y.-C. Hsieh, P.-S. You, and T.-C. Chen, "A New Ultralightweight RFID Protocol with Mutual Authentication," Proc. WASE Int'l Conf. Information Eng. (ICIE '09), 2009.
-
(2009)
Proc. WASE Int'l Conf. Information Eng. (ICIE '09)
-
-
Lee, Y.-C.1
Hsieh, Y.-C.2
You, P.-S.3
Chen, T.-C.4
-
46
-
-
54049143316
-
Elliptic-curve-based security processor for rfid
-
Nov.
-
Y.K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic-Curve-Based Security Processor for RFID," IEEE Trans. Computers, vol. 57, no. 11, pp. 1514-1517, Nov. 2008.
-
(2008)
IEEE Trans. Computers
, vol.57
, Issue.11
, pp. 1514-1517
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
47
-
-
34547617482
-
Dynamic key-updating: Privacy-preserving authentication for rfid systems
-
L. Lu, J. Han, L. Hu, Y. Liu, and L. Ni, "Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems," Proc. Int'l Conf. Pervasive Computing and Comm. (PerCom), 2007.
-
(2007)
Proc. Int'l Conf. Pervasive Computing and Comm. (PerCom)
-
-
Lu, L.1
Han, J.2
Hu, L.3
Liu, Y.4
Ni, L.5
-
49
-
-
34247523203
-
HB-MP: A further step in the HB-family of lightweight authentication protocols
-
DOI 10.1016/j.comnet.2007.01.011, PII S1389128607000242, Advances in Smart Cards
-
J. Munilla and A. Peinado, "HB-MP: A Further Step in the HB-Family of Lightweight Authentication Protocols," Computer Networks, vol. 51, pp. 2262-2267, 2007. (Pubitemid 46654842)
-
(2007)
Computer Networks
, vol.51
, Issue.9
, pp. 2262-2267
-
-
Munilla, J.1
Peinado, A.2
-
50
-
-
36248949547
-
Enhancing security of epcglobal gen-2 rfid tag against traceability and cloning
-
D.N. Duc, J. Park, H. Lee, and K. Kim, "Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning," Proc. Symp. Cryptography and Information Security, 2006.
-
(2006)
Proc. Symp. Cryptography and Information Security
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
52
-
-
49049102767
-
A secure high-speed identification scheme for rfid using bloom filters
-
Y. Nohara, S. Inoue, and H. Yasuura, "A Secure High-Speed Identification Scheme for RFID Using Bloom Filters," Proc. Third Int'l Conf. Availability, Reliability and Security (AReS), 2008.
-
(2008)
Proc. Third Int'l Conf. Availability, Reliability and Security (AReS)
-
-
Nohara, Y.1
Inoue, S.2
Yasuura, H.3
-
55
-
-
33749994390
-
Efficient hash-chain based rfid privacy protection scheme
-
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Efficient Hash-Chain Based RFID Privacy Protection Scheme," Proc. Int'l Conf. Ubiquitous Computing, Workshop Privacy: Current Status and Future Directions, 2004.
-
(2004)
Proc. Int'l Conf. Ubiquitous Computing, Workshop Privacy: Current Status and Future Directions
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
57
-
-
84865529995
-
Weaknesses in two recent lightweight rfid authentication protocols
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, T. Li, and J.C. van der Lubbe, "Weaknesses in Two Recent Lightweight RFID Authentication Protocols," Proc. Workshop RFID Security (RFIDSec '09), 2009.
-
(2009)
Proc. Workshop RFID Security (RFIDSec '09)
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Li, T.4
Lubbe Der Van, J.C.5
-
58
-
-
77949860851
-
Advances in ultralightweight cryptography for low-cost rfid tags: Gossamer protocol
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol," Proc. Workshop Information Security Applications (WISA '08), 2008.
-
(2008)
Proc. Workshop Information Security Applications (WISA '08)
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
59
-
-
65749086917
-
Cryptanalysis of a novel authentication protocol conforming to epc-c1g2 standard
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard," Proc. Workshop RFID Security (RFIDSec '07), 2007.
-
(2007)
Proc. Workshop RFID Security (RFIDSec '07)
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
60
-
-
34548165793
-
EMAP: An efficient mutual authentication protocol for low-cost rfid tags
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags," Proc. OTM Federated Conf. Workshop: IS Workshop, 2006.
-
(2006)
Proc. OTM Federated Conf. Workshop: IS Workshop
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
61
-
-
36248971663
-
LMAP: A real lightweight mutual authentication protocol for low-cost rfid tags
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags," Proc. Workshop RFID Security (RFIDSec '06), 2006.
-
(2006)
Proc. Workshop RFID Security (RFIDSec '06)
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
62
-
-
33750067948
-
M2AP: A minimalist mutual-authentication protocol for low-cost rfid tags
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags," Proc. Int'l Conf. Ubiquitous Intelligence and Computing (UIC '06), 2006.
-
(2006)
Proc. Int'l Conf. Ubiquitous Intelligence and Computing (UIC '06)
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
63
-
-
79959978275
-
Cryptanalysis of an epc class-1 generation-2 standard compliant authentication protocol
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.E. Tapiador, and J.C.A. van der Lubbe, "Cryptanalysis of an EPC Class-1 Generation-2 Standard Compliant Authentication Protocol," Eng. Applications of Artificial Intelligence, vol. 24, pp. 1061-1069, 2011.
-
(2011)
Eng. Applications of Artificial Intelligence
, vol.24
, pp. 1061-1069
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Tapiador, J.E.3
Lubbe Der Van, A.J.C.4
-
64
-
-
84883159079
-
Commission recommendation of 12.05.2009-sec(2009) 585/586, on the implementation of privacy and data protection principles in applications supported by radio-frequency identification
-
May
-
V. Reding, "Commission Recommendation of 12.05.2009-sec(2009) 585/586, on the Implementation of Privacy and Data Protection Principles in Applications Supported by Radio-Frequency Identification," Commission of the European Communities, May 2009.
-
(2009)
Commission of the European Communities
-
-
Reding, V.1
-
68
-
-
34748848124
-
Universally composable and forward-secure rfid authentication and authenticated key exchange
-
T.V. Le, M. Burmester, and B. de Medeiros, "Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange," Proc. ACM Symp. Information, Computer and Comm. Security, 2007.
-
(2007)
Proc. ACM Symp. Information, Computer and Comm. Security
-
-
Le, T.V.1
Burmester, M.2
De Medeiros, B.3
-
70
-
-
47649131906
-
Storage-awareness: Rfid private authentication based on sparse tree
-
W. Wang, Y. Li, L. Hu, and L. Lu, "Storage-Awareness: RFID Private Authentication Based on Sparse Tree," Proc. Third Int'l Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007.
-
(2007)
Proc. Third Int'l Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing
-
-
Wang, W.1
Li, Y.2
Hu, L.3
Lu, L.4
-
71
-
-
70349337026
-
Randomizing rfid private authentication
-
Q. Yao, Y. Qi, J. Han, J. Zhao, X. Li, and Y. Liu, "Randomizing RFID Private Authentication," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), 2009.
-
(2009)
Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom)
-
-
Yao, Q.1
Qi, Y.2
Han, J.3
Zhao, J.4
Li, X.5
Liu, Y.6
-
73
-
-
77957851534
-
Securing rfid systems conforming to epc class 1 generation 2 standard
-
T.-C. Yeh, Y.-J. Wang, T.-C. Kuo, and S.-S. Wang, "Securing RFID Systems Conforming to EPC Class 1 Generation 2 Standard," Expert System Applications, vol. 37, pp. 7678-7683, 2010.
-
(2010)
Expert System Applications
, vol.37
, pp. 7678-7683
-
-
Yeh, T.-C.1
Wang, Y.-J.2
Kuo, T.-C.3
Wang, S.-S.4
|