-
1
-
-
84884712844
-
-
International Telecommunication Union. ITU Internet Reports 2005. The Internet of Things, November
-
International Telecommunication Union. ITU Internet Reports 2005. The Internet of Things, November 2005, http://www.itu.int/osg/spu/publications/internetofthings
-
(2005)
-
-
-
2
-
-
79951677671
-
-
Distance bounding protocol for mutual authentication. IEEE Transactions on Wireless Communications
-
Yum DH, Kim JS, Hong SJ, Lee PJ. Distance bounding protocol for mutual authentication. IEEE Transactions on Wireless Communications 2011; 10(2): 592-601.
-
(2011)
, vol.10
, Issue.2
, pp. 592-601
-
-
Yum, D.H.1
Kim, J.S.2
Hong, S.J.3
Lee, P.J.4
-
3
-
-
84884709438
-
-
RFID mutual authentication protocols. Decision Support Systems, Elsevier
-
Piramuthu S. RFID mutual authentication protocols. Decision Support Systems, Elsevier (in press), 2010.
-
(2010)
-
-
Piramuthu, S.1
-
4
-
-
78650590814
-
-
Impossibility results for RFID privacy notions. Transaction on Computational Science XI
-
Armknecht F, Sadeghi A-R, Scafuro A, Visconti I, Wachsmann C. Impossibility results for RFID privacy notions. Transaction on Computational Science XI (6480) 2010; 39-63.
-
(2010)
, pp. 39-63
-
-
Armknecht, F.1
Sadeghi, A.-R.2
Scafuro, A.3
Visconti, I.4
Wachsmann, C.5
-
5
-
-
78049383154
-
Privacy versus scalability in radio frequency identification systems
-
Alomair B, Poovendran R. Privacy versus scalability in radio frequency identification systems. Computer Communications, 2010; 33(18): 2155-2163.
-
(2010)
Computer Communications
, vol.33
, Issue.18
, pp. 2155-2163
-
-
Alomair, B.1
Poovendran, R.2
-
6
-
-
77953892886
-
-
Cryptographic puzzles and distance-bounding protocols: practical tools for RFID security. IEEE International Conference on RFID-IEEE RFID 2010, IEEE, IEEE Computer Society, Orlando, Florida, USA
-
Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Palomar E, van der Lubbe JCA. Cryptographic puzzles and distance-bounding protocols: practical tools for RFID security. IEEE International Conference on RFID-IEEE RFID 2010, IEEE, IEEE Computer Society, Orlando, Florida, USA, 2010; 45-52.
-
(2010)
, pp. 45-52
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Palomar, E.4
van der Lubbe, J.C.A.5
-
7
-
-
78650114205
-
A lightweight implementation of Keccak hash function for radio-frequency identification applications
-
Yalcin SO (ed). Springer: Istanbul, Turkey
-
Kavun EB, Yalcin T. A lightweight implementation of Keccak hash function for radio-frequency identification applications. In Workshop on RFID Security-RFIDSec'10', Yalcin SO (ed). Springer: Istanbul, Turkey, 2010; 258-269.
-
(2010)
Workshop on RFID Security-RFIDSec'10'
, pp. 258-269
-
-
Kavun, E.B.1
Yalcin, T.2
-
8
-
-
84884710937
-
-
Secure personal network, IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008. PIMRC
-
Anggraeni PN, Prasad NR, Prasad R. Secure personal network, IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008. PIMRC 2008; 1-5.
-
(2008)
, pp. 1-5
-
-
Anggraeni, P.N.1
Prasad, N.R.2
Prasad, R.3
-
9
-
-
63749088611
-
-
Secure and Dynamic Cooperation of Personal Networks in a Fednet, 6th IEEE Consumer Communications and Networking Conference, 2009. CCNC 2009.
-
Malohat Ibrohimovna, Sonia Heemstra de Groot, Jinglong Zhou. Secure and Dynamic Cooperation of Personal Networks in a Fednet, 6th IEEE Consumer Communications and Networking Conference, 2009. CCNC 2009. 2009; 8-14.
-
(2009)
, pp. 8-14
-
-
Malohat, I.1
Sonia, H.d.G.2
Jinglong, Z.3
-
10
-
-
84884708085
-
-
Project IST-FP6-IP-027396, Magnet Beyond. , last accessed: March 2012.
-
Project IST-FP6-IP-027396, Magnet Beyond. http://cordis.europa.eu/projects/80699_en.html, last accessed: March 2012.
-
-
-
-
11
-
-
77955114580
-
-
RFID added value sensing capabilities: European advances in integrated RFID-WSN middleware. 2010 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON)
-
Anggorjati B, Çetin K, Mihovska A, Prasad N. RFID added value sensing capabilities: European advances in integrated RFID-WSN middleware. 2010 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON), 2010; 1-3.
-
(2010)
, pp. 1-3
-
-
Anggorjati, B.1
Çetin, K.2
Mihovska, A.3
Prasad, N.4
-
12
-
-
56549103722
-
-
The research of network architecture in warehouse management system based on RFID and WSN integration. IEEE International Conference on Automation and Logistics, ICAL
-
Xiaoguang Z, Wei L. The research of network architecture in warehouse management system based on RFID and WSN integration. IEEE International Conference on Automation and Logistics, ICAL 2008; 2556-2560.
-
(2008)
, pp. 2556-2560
-
-
Xiaoguang, Z.1
Wei, L.2
-
13
-
-
78651112967
-
Next generation RFID-based medical service management system architecture in wireless sensor network
-
Kim T-h, Chang AC-C, Li M, Rong C, Patrikakis CZ, Slezak D (eds). Springer Berlin: Heidelberg, 10.1007/978-3-642-17587-9_17
-
Tolentino RS, Lee K, Kim Y-T, Park G-C. Next generation RFID-based medical service management system architecture in wireless sensor network. In Communication and Networking, Kim T-h, Chang AC-C, Li M, Rong C, Patrikakis CZ, Slezak D (eds). Springer Berlin: Heidelberg, 2010; 147-154. 10.1007/978-3-642-17587-9_17
-
(2010)
Communication and Networking
, pp. 147-154
-
-
Tolentino, R.S.1
Lee, K.2
Kim, Y.-T.3
Park, G.-C.4
-
14
-
-
84884718105
-
-
Secure architecture for the integration of RFID and sensors in personal networks. 7th International Workshop on Security and Trust Management (STM11), Springer, Copenhagen, Denmark, In Press.
-
Najera P, Roman R, Lopez J. Secure architecture for the integration of RFID and sensors in personal networks. 7th International Workshop on Security and Trust Management (STM11), Springer, Copenhagen, Denmark, In Press.
-
-
-
Najera, P.1
Roman, R.2
Lopez, J.3
-
15
-
-
84884707198
-
-
Ecma International. Technical Report TR/102, Personal Networks-Overview and Standardization Needs. 1st Edition, December 2010.
-
Ecma International. Technical Report TR/102, Personal Networks-Overview and Standardization Needs. 1st Edition, December 2010.
-
-
-
-
16
-
-
84884724357
-
-
RFID Security and Privacy Lounge. , last accessed: March 2012.
-
RFID Security and Privacy Lounge. http://www.avoine.net/rfid/index.php, last accessed: March 2012.
-
-
-
-
17
-
-
67650336836
-
-
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents.
-
Najera P, Moyano F, Lopez J. Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. Journal of Universal Computer Science 2009; 15(5): 970-991.
-
(2009)
Journal of Universal Computer Science
, vol.15
, Issue.5
, pp. 970-991
-
-
Najera, P.1
Moyano, F.2
Lopez, J.3
-
18
-
-
84884714737
-
-
Workshop on RFID Security-RFIDSec Asia'10. IOS Press: Singapore, Republic of Singapore
-
Aigner M. Security in the Internet of Things. Workshop on RFID Security-RFIDSec Asia'10. IOS Press: Singapore, Republic of Singapore, 2010.
-
(2010)
Security in the Internet of Things
-
-
Aigner, M.1
-
19
-
-
84865489048
-
-
Workshop on RFID Security-RFIDSec Asia'11. IOS Press: Wuxi, China
-
Dominikus S, Gross H, Aigner M, Kraxberger S. Low-cost RFID Tags as IPv6 Nodes in the Internet of Things. Workshop on RFID Security-RFIDSec Asia'11. IOS Press: Wuxi, China, 2011; 114-128.
-
(2011)
Low-cost RFID Tags as IPv6 Nodes in the Internet of Things
, pp. 114-128
-
-
Dominikus, S.1
Gross, H.2
Aigner, M.3
Kraxberger, S.4
-
20
-
-
84884722325
-
-
Google Nexus. , last accessed: March 2012.
-
Google Nexus. http://www.google.com/nexus/tech-specs.html, last accessed: March 2012.
-
-
-
-
21
-
-
84884714444
-
-
Blackberry Bold 9900. , last accessed: March 2012.
-
Blackberry Bold 9900. http://worldwide.blackberry.com/blackberrybold/blackberry-bold-9900-9930, last accessed: March 2012.
-
-
-
-
22
-
-
84884726332
-
-
Connecting passive RFID tags to the Internet of Things. Interconnecting Smart Objects with the Internet Workshop, Prague, Czech Republic
-
Dominikus S, Schmidt J-M. Connecting passive RFID tags to the Internet of Things. Interconnecting Smart Objects with the Internet Workshop, Prague, Czech Republic, 2011.
-
(2011)
-
-
Dominikus, S.1
Schmidt, J.-M.2
-
23
-
-
79952965954
-
Practical RFID ownership transfer scheme
-
Yu Ng C, Susilo W, Mu Y, Safavi-Naini R. Practical RFID ownership transfer scheme. Journal of Computer Security-Special Issue on RFID System Security 2011; 19(2): 319-341.
-
(2011)
Journal of Computer Security-Special Issue on RFID System Security
, vol.19
, Issue.2
, pp. 319-341
-
-
Yu Ng, C.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
24
-
-
79151469014
-
Scalable RFID security protocols supporting tag ownership transfer
-
Song B, Mitchell CJ. Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 2011; 34(4): 556-566.
-
(2011)
Computer Communications
, vol.34
, Issue.4
, pp. 556-566
-
-
Song, B.1
Mitchell, C.J.2
-
25
-
-
84857500576
-
-
Single RFID tag ownership transfer protocols. IEEE Transactions on Systems, Man, and Cybernetics
-
Kapoor G, Piramuthu S. Single RFID tag ownership transfer protocols. IEEE Transactions on Systems, Man, and Cybernetics 2011; 42(2): 1-10.
-
(2011)
, vol.42
, Issue.2
, pp. 1-10
-
-
Kapoor, G.1
Piramuthu, S.2
-
26
-
-
37849023446
-
-
The 6LoWPAN architecture. Proceedings of the 4th Workshop on Embedded Networked Sensors, ACM, New York, NY, USA
-
Mulligan G. The 6LoWPAN architecture. Proceedings of the 4th Workshop on Embedded Networked Sensors, ACM, New York, NY, USA, 2007; 78-82.
-
(2007)
, pp. 78-82
-
-
Mulligan, G.1
-
27
-
-
78650530349
-
-
Securing Mobile Unattended WSNs against a Mobile Adversary. 2010 29th IEEE Symposium on Reliable Distributed Systems, IEEE Computer Society, Washington, DC, USA
-
Di Pietro R, Oligeri G, Soriente C, Tsudik G. Securing Mobile Unattended WSNs against a Mobile Adversary. 2010 29th IEEE Symposium on Reliable Distributed Systems, IEEE Computer Society, Washington, DC, USA, 2010; 11-20.
-
(2010)
, pp. 11-20
-
-
Di Pietro, R.1
Oligeri, G.2
Soriente, C.3
Tsudik, G.4
-
28
-
-
77951265113
-
-
An architecture based on Internet of Things to support mobility and security in medical environments. Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE
-
Jara A, Zamora M, Skarmeta A. An architecture based on Internet of Things to support mobility and security in medical environments. Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE, 2010; 1-5.
-
(2010)
, pp. 1-5
-
-
Jara, A.1
Zamora, M.2
Skarmeta, A.3
-
29
-
-
79960660075
-
On the hardware implementation cost of crypto-processors architectures, information systems security
-
A Taylor & Francis Group Publication
-
Sklavos N. On the hardware implementation cost of crypto-processors architectures, information systems security. The official journal of (ISC)2, A Taylor & Francis Group Publication 2010; 19(2): 53-60.
-
(2010)
The official journal of (ISC)2
, vol.19
, Issue.2
, pp. 53-60
-
-
Sklavos, N.1
-
30
-
-
70349087741
-
-
A low-resource public-key identification scheme for RFID tags and sensor nodes. Proceedings of the second ACM conference on Wireless network security, ACM, New York, NY, USA
-
Oren Y, Feldhofer M. A low-resource public-key identification scheme for RFID tags and sensor nodes. Proceedings of the second ACM conference on Wireless network security, ACM, New York, NY, USA, 2009; 59-68.
-
(2009)
, pp. 59-68
-
-
Oren, Y.1
Feldhofer, M.2
-
31
-
-
79952583451
-
Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags
-
Biryukov A, Gong G, Stinson D (eds). Springer Berlin: Heidelberg, 10.1007/978-3-642-19574-7_8
-
Plos T, Groß H, Feldhofer M. Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags. In Selected Areas in Cryptography, Biryukov A, Gong G, Stinson D (eds). Springer Berlin: Heidelberg, 2011; 114-129. 10.1007/978-3-642-19574-7_8,
-
(2011)
Selected Areas in Cryptography
, pp. 114-129
-
-
Plos, T.1
Groß, H.2
Feldhofer, M.3
-
32
-
-
84859727220
-
Lightweight cryptography for RFID tags
-
10:2
-
Maimut D, Ouafi K. Lightweight cryptography for RFID tags. Security Privacy IEEE 2012; (10:2):76-79.
-
(2012)
Security Privacy IEEE
, pp. 76-79
-
-
Maimut, D.1
Ouafi, K.2
-
33
-
-
84857451143
-
A comparative study of hardware architectures for lightweight block ciphers
-
Kitsos P, Sklavos N, Parousi M, Skodras AN. A comparative study of hardware architectures for lightweight block ciphers. Computers and Electrical Engineering 2012; 10(2):148-160.
-
(2012)
Computers and Electrical Engineering
, vol.10
, Issue.2
, pp. 148-160
-
-
Kitsos, P.1
Sklavos, N.2
Parousi, M.3
Skodras, A.N.4
-
34
-
-
79957478734
-
-
Toward practical public key anti-counterfeiting for low-cost EPC tags. 2011 IEEE International Conference on RFID
-
Arbit A, Oren Y, Wool A. Toward practical public key anti-counterfeiting for low-cost EPC tags. 2011 IEEE International Conference on RFID, 2011; 38(1)184-191.
-
(2011)
, vol.38
, Issue.1
, pp. 184-191
-
-
Arbit, A.1
Oren, Y.2
Wool, A.3
-
35
-
-
82155192490
-
-
Security implementation within GEN2 protocol. 2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), DOI: 10.1109/RFID.2011.5764620.
-
Seshabhattar S, Jagannatha S, Engels D. Security implementation within GEN2 protocol. 2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), 2011; 402-407. DOI: 10.1109/RFID.2011.5764620. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5764620&tag=1
-
(2011)
, pp. 402-407
-
-
Seshabhattar, S.1
Jagannatha, S.2
Engels, D.3
-
36
-
-
52949134853
-
-
Ultra-lightweight implementations for smart devices-security for 1000 gate equivalents. Proceedings of the 8th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, Springer-Verlag, Berlin, Heidelberg
-
Rolfes C, Poschmann A, Leander G, Paar C. Ultra-lightweight implementations for smart devices-security for 1000 gate equivalents. Proceedings of the 8th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, Springer-Verlag, Berlin, Heidelberg, 2008; 89-103.
-
(2008)
, pp. 89-103
-
-
Rolfes, C.1
Poschmann, A.2
Leander, G.3
Paar, C.4
-
37
-
-
84055192371
-
A hardware processor supporting elliptic curve cryptography for less than 9 kGEs
-
Prouff E (ed). Springer Berlin: Heidelberg, 10.1007/978-3-642-27257-8_12
-
Wenger E, Hutter M. A hardware processor supporting elliptic curve cryptography for less than 9 kGEs. In Smart Card Research and Advanced Applications, Prouff E (ed). Springer Berlin: Heidelberg, 2011; 182-198. 10.1007/978-3-642-27257-8_12
-
(2011)
Smart Card Research and Advanced Applications
, pp. 182-198
-
-
Wenger, E.1
Hutter, M.2
-
38
-
-
50249090558
-
-
First experiences with personal networks as an enabling platform for service providers. Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services 1-8, Philadelphia, August 2007.
-
den Hartog FTH, Blom MA, Peeters ME, et al. First experiences with personal networks as an enabling platform for service providers. Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 1-8, Philadelphia, August 2007.
-
-
-
den Hartog, F.T.H.1
Blom, M.A.2
Peeters, M.E.3
-
39
-
-
84884712890
-
-
Open Mobile Alliance, On the definition and architectural needs of Personal Networks. .
-
Open Mobile Alliance, On the definition and architectural needs of Personal Networks. 2008.
-
(2008)
-
-
-
40
-
-
84884717810
-
-
Open Mobile Alliance, OMA-TP-CPNS-2008-0027-INP-CPNS: CPNS Scope. .
-
Open Mobile Alliance, OMA-TP-CPNS-2008-0027-INP-CPNS: CPNS Scope. 2008.
-
(2008)
-
-
-
41
-
-
51649098804
-
-
CPFP: an efficient key management scheme for large scale personal networks. International Symposium on Wireless Pervasive Computing (ISWPC 2008).
-
Mirzadeh S, Armknecht F, Pallares JJ, et al. CPFP: an efficient key management scheme for large scale personal networks. International Symposium on Wireless Pervasive Computing 2008 (ISWPC 2008).
-
(2008)
-
-
Mirzadeh, S.1
Armknecht, F.2
Pallares, J.J.3
-
42
-
-
63749095662
-
-
Device authentication and registration method assisted by a cellular system for user-driven service creation architecture. 2009 6th IEEE Consumer Communications and Networking Conference. CCNC
-
Matsunaka T, Warabino T, Kishi Y, Nakauchi K, Umezawa T, Inoue M. Device authentication and registration method assisted by a cellular system for user-driven service creation architecture. 2009 6th IEEE Consumer Communications and Networking Conference. CCNC 2009; 1-5.
-
(2009)
, pp. 1-5
-
-
Matsunaka, T.1
Warabino, T.2
Kishi, Y.3
Nakauchi, K.4
Umezawa, T.5
Inoue, M.6
-
43
-
-
44949139538
-
-
Authentication procedure and terminal switching scheme for PAN services. In Asia-Pacific Conference on Communications (APCC'06)
-
Fujino S, Motoyoshi G. Authentication procedure and terminal switching scheme for PAN services. In Asia-Pacific Conference on Communications (APCC'06), 2006; 1-5.
-
(2006)
, pp. 1-5
-
-
Fujino, S.1
Motoyoshi, G.2
-
46
-
-
36349033618
-
-
Evaluating secure cluster formation in personal networks. Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE
-
Jehangir A, de Groot SH. Evaluating secure cluster formation in personal networks. Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, 2007; 3134-3140.
-
(2007)
, pp. 3134-3140
-
-
Jehangir, A.1
de Groot, S.H.2
-
47
-
-
78049451613
-
Readers behaving badly
-
In, Lecture Notes in Computer Science, Gritzalis D, Preneel B, Theoharidou M (eds). Springer Berlin: Heidelberg,
-
Nithyanand R, Tsudik G, Uzun E. Readers behaving badly. In Computer Security ESORICS 2010, Lecture Notes in Computer Science, Gritzalis D, Preneel B, Theoharidou M (eds). Springer Berlin: Heidelberg, 2010; 19-36. http://dx.doi.org/10.1007/978-3-642-15497-3_2
-
(2010)
Computer Security ESORICS 2010
, pp. 19-36
-
-
Nithyanand, R.1
Tsudik, G.2
Uzun, E.3
-
48
-
-
42449112449
-
Virtual identity framework for telecom infrastructures
-
Sarma A, Matos A, Girão J, Aguiar RL. Virtual identity framework for telecom infrastructures. Wireless Personal Communications 2008; 45(4):521-543.
-
(2008)
Wireless Personal Communications
, vol.45
, Issue.4
, pp. 521-543
-
-
Sarma, A.1
Matos, A.2
Girão, J.3
Aguiar, R.L.4
-
49
-
-
79961243703
-
-
A framework for managing composed multimedia delivery in personal networks. Multimedia Computing and Systems (ICMCS), 2011 International Conference on
-
Chaabane A, Louati W, Jmaiel M. A framework for managing composed multimedia delivery in personal networks. Multimedia Computing and Systems (ICMCS), 2011 International Conference on, 2011; 1-6.
-
(2011)
, pp. 1-6
-
-
Chaabane, A.1
Louati, W.2
Jmaiel, M.3
-
52
-
-
77955869819
-
-
Reputation-based service management and reward mechanisms in fednets to improve the quality of cooperation between personal networks. 2010 Fifth International Conference on Digital Telecommunications (ICDT)
-
Ibrohimovna M, Groot SH. Reputation-based service management and reward mechanisms in fednets to improve the quality of cooperation between personal networks. 2010 Fifth International Conference on Digital Telecommunications (ICDT) 2010; 98-103.
-
(2010)
, pp. 98-103
-
-
Ibrohimovna, M.1
Groot, S.H.2
|