-
1
-
-
84883256395
-
-
(accessed 10.10.12).
-
EPCglobal. < http://www.epcglobalinc.org/ > (accessed 10.10.12).
-
-
-
-
4
-
-
68849120029
-
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
-
H.Y. Chien, and C.S. Laih ECC-based lightweight authentication protocol with untraceability for low-cost RFID Journal of Parallel and Distributed Computing 69 2009 848 853
-
(2009)
Journal of Parallel and Distributed Computing
, vol.69
, pp. 848-853
-
-
Chien, H.Y.1
Laih, C.S.2
-
6
-
-
33751513718
-
Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
-
D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning, in: The 2006 Symposium on Cryptography and Information Security, 2006.
-
(2006)
The 2006 Symposium on Cryptography and Information Security
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
7
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
A.D. Henrici, P. MÄuller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: Proceedings of PerSec'04 at IEEE PerCom, 2004, pp.149-153.
-
(2004)
Proceedings of PerSec'04 at IEEE PerCom
, pp. 149-153
-
-
Henrici, A.D.1
-
8
-
-
68849086667
-
Strengthening EPC tag against cloning
-
A. Juels, Strengthening EPC tag against cloning, in: Proceedings of WiSe '05, 2005.
-
(2005)
Proceedings of WiSe '05
-
-
Juels, A.1
-
10
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, in: Conference on Computer and Communications Security - CCS'04, 2004, pp. 210-219.
-
Conference on Computer and Communications Security - CCS'04, 2004
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
12
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
K. Rhee, J. Kwak, S. Kim, D. Won, Challenge-response based RFID authentication protocol for distributed database environment, in: International Conference on Security in Pervasive Computing - SPC 2005, 2005, pp. 70-84.
-
(2005)
International Conference on Security in Pervasive Computing - SPC 2005
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
14
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, Security and privacy aspects of low-cost radio frequency identification systems, in: Proceedings of the First Security in Pervasive Computing, LNCS, vol. 2802, 2003, pp. 201-212.
-
(2003)
Proceedings of the First Security in Pervasive Computing, LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
15
-
-
33749379761
-
Mutual authentication protocol for low-cost RFID
-
J. Yang, J. Park, H. Lee, K. Ren, K. Kim, Mutual authentication protocol for low-cost RFID, in: Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, 2005.
-
(2005)
Handout of the Ecrypt Workshop on RFID and Lightweight Crypto
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
-
18
-
-
55749098453
-
New mutual agreement protocol to secure mobile RFID-enabled devices
-
N. Lo, K.-H. Yeh, and C.Y. Yeun New mutual agreement protocol to secure mobile RFID-enabled devices Information Security Technical Report 13 2008 151 157
-
(2008)
Information Security Technical Report
, vol.13
, pp. 151-157
-
-
Lo, N.1
Yeh, K.-H.2
Yeun, C.Y.3
-
19
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
-
H.Y. Chien, and C.H. Chen Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards Computers Standards and Interfaces 29/2 February 2007 254 259
-
(2007)
Computers Standards and Interfaces
, vol.292
, Issue.FEBRUARY
, pp. 254-259
-
-
Chien, H.Y.1
Chen, C.H.2
-
20
-
-
33747058795
-
Security implications in RFID and authentication processing framework
-
J. Ayoade Security implications in RFID and authentication processing framework Computers & Security 25 2006 207 212
-
(2006)
Computers & Security
, vol.25
, pp. 207-212
-
-
Ayoade, J.1
-
22
-
-
30344469114
-
Authenticating pervasive devices with human protocols
-
LNCS Springer
-
A. Juels, and S.A. Weis Authenticating pervasive devices with human protocols Advances in Cryptology - Crypto'05 LNCS vol. 3126 2005 Springer 293 308
-
(2005)
Advances in Cryptology - Crypto'05
, vol.3126 VOL.
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
23
-
-
33144487342
-
An Active Attack against HB+-A Provably Secure Lightweight Authentication Protocol
-
Report 2005/237
-
H. Gilbert, M. Robshaw, H. Sibert, An Active Attack against HB+-A Provably Secure Lightweight Authentication Protocol, Cryptology ePrint Archive, Report 2005/237, 2005.
-
(2005)
Cryptology EPrint Archive
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
24
-
-
33845920117
-
HB++: A lightweight authentication protocol secure against some attacks
-
J. Bringer, H. Chabanne, E. Dottax, HB++: A lightweight authentication protocol secure against some attacks, in: IEEE International Conference on Pervasive Service, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, 2006.
-
(2006)
IEEE International Conference on Pervasive Service, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
25
-
-
36249031858
-
HB and related lightweight authentication protocols for secure RFID Tag/Reader authentication
-
S. Piramuthu, HB and related lightweight authentication protocols for secure RFID Tag/Reader authentication, in: CollECTeR Europe Conference, 2006.
-
(2006)
CollECTeR Europe Conference
-
-
Piramuthu, S.1
-
26
-
-
38149008857
-
Cryptanalysis of EPC Class 1 Generation 2 RFID authentication
-
C.L. Lin, K.C. Chang, Cryptanalysis of EPC Class 1 Generation 2 RFID authentication, in: Information Security Conference 2007, ChiaYi, Taiwan, 2007.
-
(2007)
Information Security Conference 2007, ChiaYi, Taiwan
-
-
Lin, C.L.1
Chang, K.C.2
-
27
-
-
36248971663
-
LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Ribagorda, LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags, in: Proc. of 2nd Workshop on RFID Security, 2006.
-
(2006)
Proc. Of 2nd Workshop on RFID Security
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
29
-
-
34548165793
-
EMAP: An efficient mutual authentication protocol for low-cost RFID tags
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Ribagorda, EMAP: an efficient mutual authentication protocol for low-cost RFID tags, in: OTM Federated Conferences and Workshop: IS Workshop, 2006.
-
(2006)
OTM Federated Conferences and Workshop: IS Workshop
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
30
-
-
57849147967
-
Security analysis of two ultra-lightweight RFID authentication protocols
-
T. Li, G. Wang, Security analysis of two ultra-lightweight RFID authentication protocols, in; IFIP SEC 2007, 2007.
-
(2007)
IFIP SEC 2007
-
-
Li, T.1
Wang, G.2
-
32
-
-
46749130059
-
A novel mutual authentication scheme based on quadratic residues for RFID systems
-
Y. Chen, J.S. Chou, and H.M. Sun A novel mutual authentication scheme based on quadratic residues for RFID systems Computer Networks 52 2008 2373 2380
-
(2008)
Computer Networks
, vol.52
, pp. 2373-2380
-
-
Chen, Y.1
Chou, J.S.2
Sun, H.M.3
-
33
-
-
33744462119
-
A remote authentication scheme preserving user anonymity
-
(ISBN 0-7695-2249-1).
-
H.Y. Chien, C.H. Chen, A remote authentication scheme preserving user anonymity, in: The IEEE First International Workshop on Information Networking and Applications, March (INA'2005), 2005, pp. 245-248 (ISBN 0-7695-2249-1).
-
(2005)
The IEEE First International Workshop on Information Networking and Applications, March (INA'2005)
, pp. 245-248
-
-
Chien, H.Y.1
Chen, C.H.2
-
34
-
-
77949562527
-
Cryptanalysis of some RFID authentication protocols
-
T. Cao, and P. Shen Cryptanalysis of some RFID authentication protocols Journal of Communications 3 7 2008 20 27
-
(2008)
Journal of Communications
, vol.3
, Issue.7
, pp. 20-27
-
-
Cao, T.1
Shen, P.2
-
36
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
H.-Y. Chien SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity IEEE Transactions on Dependable and Secure Computing 4 4 2007 337 340
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
37
-
-
84865741288
-
A minimum disclosure approach to authentication and privacy in RFID systems
-
R. Doss, W. Zhou, S. Sundaresan, S. Yu, and L. Gao A minimum disclosure approach to authentication and privacy in RFID systems Computer Networks 56 2012 3401 3416
-
(2012)
Computer Networks
, vol.56
, pp. 3401-3416
-
-
Doss, R.1
Zhou, W.2
Sundaresan, S.3
Yu, S.4
Gao, L.5
-
39
-
-
84957629783
-
Relations among notations of security for public key encryption schemes
-
LNCS Springer-Verlag
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway Relations among notations of security for public key encryption schemes Proceedings of CRYPTO'98 LNCS vol. 1462 1998 Springer-Verlag 26 45
-
(1998)
Proceedings of CRYPTO'98
, vol.1462 VOL.
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
41
-
-
84958666890
-
Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
-
Springer Berlin
-
T.A. Berson Failure of the McEliece public-key cryptosystem under message-resend and related-message attack Advances in Cryptology - CRYPTO97 1997 Springer Berlin 213 220
-
(1997)
Advances in Cryptology - CRYPTO97
, pp. 213-220
-
-
Berson, T.A.1
-
43
-
-
84956862729
-
The Rao-Nam scheme is insecure against a chosen-plaintext attack
-
Springer Berlin
-
R. Struik, and J. Tilburg The Rao-Nam scheme is insecure against a chosen-plaintext attack Advances in Cryptology - CRYPTO87 1988 Springer Berlin 445 457
-
(1988)
Advances in Cryptology - CRYPTO87
, pp. 445-457
-
-
Struik, R.1
Tilburg, J.2
-
45
-
-
49049096211
-
A tamper detection method for RFID data
-
Las Vegas, USA
-
A. Yamamoto, S. Suzuki, H. Hada, J. Mitsugi, F. Teraoka, O. Nakamura, A tamper detection method for RFID data, in: IEEE International Conference on RFID, Las Vegas, USA, 2008, pp. 51-57.
-
(2008)
IEEE International Conference on RFID
, pp. 51-57
-
-
Yamamoto, A.1
Suzuki, S.2
Hada, H.3
Mitsugi, J.4
Teraoka, F.5
Nakamura, O.6
-
46
-
-
52249084191
-
A practical approach for enhancing security of EPCglobal RFID Gen2 Tag
-
J. Park, J. Na, M. Kim, A practical approach for enhancing security of EPCglobal RFID Gen2 Tag, in: Proceedings of the Future Generation Communication and Networking, Jeju-Island, Korea, 2007, pp. 436-441.
-
(2007)
Proceedings of the Future Generation Communication and Networking, Jeju-Island, Korea
, pp. 436-441
-
-
Park, J.1
Na, J.2
Kim, M.3
-
47
-
-
68949181328
-
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
-
E.Y. Choi, D.H. Lee, and J.I. Lim Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems Computer Standards & Interfaces 31 6 2009 1124 1130
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.6
, pp. 1124-1130
-
-
Choi, E.Y.1
Lee, D.H.2
Lim, J.I.3
-
48
-
-
84862987913
-
On the security of Gen2-based protocols without modifying the standards
-
C.F. Lee, H.Y. Chien, C.S. Laih, and C.S. Chen On the security of Gen2-based protocols without modifying the standards The Journal of The Chinese Institute of Engineers 35 4 2012 391 399
-
(2012)
The Journal of the Chinese Institute of Engineers
, vol.35
, Issue.4
, pp. 391-399
-
-
Lee, C.F.1
Chien, H.Y.2
Laih, C.S.3
Chen, C.S.4
-
49
-
-
84883212261
-
-
< > (accessed 01.10.12).
-
Wikipedia, Decoding methods. < http://en.wikipedia.org/wiki/Decoding- methods > (accessed 01.10.12).
-
Wikipedia, Decoding Methods
-
-
-
50
-
-
84883258689
-
-
< > (accessed 01.10.12).
-
The Mifare cards. < http://www.mifare.net/ > (accessed 01.10.12).
-
The Mifare Cards
-
-
-
51
-
-
34548831373
-
A new montgomery modular multiplication algorithm and its VLSI design for RSA cryptosystem
-
J.-H. Chen, H.-S. Wu, M.-D. Shieh, W.-C. Lin, A new montgomery modular multiplication algorithm and its VLSI design for RSA cryptosystem, in: Proc. ISCAS 2007, pp.3780-3783.
-
Proc. ISCAS 2007
, pp. 3780-3783
-
-
Chen, J.-H.1
Wu, H.-S.2
Shieh, M.-D.3
Lin, W.-C.4
-
52
-
-
21644431783
-
Fast montgomery modular multiplication by pipelined CSA architecture
-
K. Manochehri, S. Pourmozafari, Fast montgomery modular multiplication by pipelined CSA architecture, in: Proc. ICM 2004, pp. 144-147.
-
Proc. ICM 2004
, pp. 144-147
-
-
Manochehri, K.1
Pourmozafari, S.2
-
53
-
-
84883242418
-
-
ISO/IEC FCD 15693-3 (accessed 24.03.13).
-
ISO/IEC FCD 15693-3, 2009. < http://www.iso.org/iso/home/store/ catalogue-tc/catalogue-detail.htm?csnumber=43467 > (accessed 24.03.13).
-
(2009)
-
-
-
56
-
-
84883229765
-
-
(accessed 25.05.13).
-
Alibaba on-line market. < http://www.alibaba.com > (accessed 25.05.13).
-
Alibaba On-line Market
-
-
|