-
1
-
-
77956578953
-
Scalable RFID systems: A privacy-preserving protocol with constant-time identification
-
In: Chicago, Illinois, USA, IEEE, IEEE Computer Society (June)
-
Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable RFID Systems: a Privacy-Preserving Protocol with Constant-Time Identification. In: the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - DSN'10, Chicago, Illinois, USA, IEEE, IEEE Computer Society (June 2010)
-
(2010)
The 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - DSN'10
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
2
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2) (February 2006) 381-394 (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
3
-
-
2942556410
-
Radio-frequency identification: Security risks and challenges
-
(Spring)
-
Sarma, S., Weis, S., Engels, D.: Radio-Frequency Identification: Security Risks and Challenges. Cryptobytes, RSA Laboratories 6(1) (Spring 2003) 2-9
-
(2003)
Cryptobytes, RSA Laboratories
, vol.6
, Issue.1
, pp. 2-9
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
4
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
In Hutter, D., Müller, G., Stephan, W., Ullmann, M., eds.: Boppard, Germany, Springer (March)
-
Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Hutter, D., Müller, G., Stephan, W., Ullmann, M., eds.: International Conference on Security in Pervasive Computing - SPC 2003. Volume 2802 of Lecture Notes in Computer Science., Boppard, Germany, Springer (March 2003) 454-469
-
(2003)
International Conference on Security in Pervasive Computing - SPC 2003. Volume 2802 of Lecture Notes in Computer Science
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
5
-
-
24944582157
-
Efficient authentication for low-cost RFID systems
-
Computational Science and Its Applications - ICCSA 2005: International Conference, Proceeedings
-
Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.L.: Efficient Authentication for Low-Cost RFID Systems. In Gervasi, O., Gavrilova, M., Kumar, V., Laganàa, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K., eds.: International Conference on Computational Science and its Applications - ICCSA 2005, Proceedings, Part I. Volume 3480 of Lecture Notes in Computer Science., Singapore, Republic of Singapore, Springer (May 2005) 619-627 (Pubitemid 41313878)
-
(2005)
Lecture Notes in Computer Science
, vol.3480
, Issue.I
, pp. 619-627
-
-
Lee, S.M.1
Hwang, Y.J.2
Lee, D.H.3
Lim, J.I.4
-
6
-
-
70349284581
-
Secure Human Identification Protocols
-
Advances in Cryptology - ASIACRYPT 2001
-
Hopper, N.J., Blum, M.: Secure human identification protocols. In: ASIACRYPT. (2001) 52-66 (Pubitemid 33371178)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
7
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
In Shoup, V., ed.: Santa Barbara, California, USA, IACR, Springer (August)
-
Juels, A., Weis, S.: Authenticating Pervasive Devices with Human Protocols. In Shoup, V., ed.: Advances in Cryptology - CRYPTO'05. Volume 3126 of Lecture Notes in Computer Science., Santa Barbara, California, USA, IACR, Springer (August 2005) 293-308
-
(2005)
Advances in Cryptology - CRYPTO'05. Volume 3126 of Lecture Notes in Computer Science
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
8
-
-
33845920117
-
++: A lightweight authentication protocol secure against some attacks
-
In: Lyon, France, IEEE, IEEE Computer Society (June)
-
++: a Lightweight Authentication Protocol Secure against Some Attacks. In: IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2006, Lyon, France, IEEE, IEEE Computer Society (June 2006)
-
(2006)
IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2006
-
-
Bringer, J.1
Chabanne, H.2
Emmanuelle, D.3
-
9
-
-
24944575863
-
Cryptographic approach to "privacy-friendly" tags
-
In: MIT, Massachusetts, USA (November)
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to "Privacy-Friendly" Tags. In: RFID Privacy Workshop, MIT, Massachusetts, USA (November 2003)
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
10
-
-
74049109627
-
An efficient forward private rfid protocol
-
Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An efficient forward private rfid protocol. In: ACM Conference on Computer and Communications Security. (2009) 43-53
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 43-53
-
-
Berbain, C.1
Billet, O.2
Etrog, J.3
Gilbert, H.4
-
11
-
-
80052658754
-
Low cost rfid authentication protocol with forward privacy
-
Chang-She, M.: Low cost rfid authentication protocol with forward privacy. Chinese Journal of Computers 34(8) (2011)
-
(2011)
Chinese Journal of Computers
, vol.34
, Issue.8
-
-
Chang-She, M.1
-
12
-
-
85180623483
-
Tracker: Security and privacy for rfid-based supply chains
-
Blass, E.O., Elkhiyaoui, K., Molva, R.: Tracker: Security and privacy for rfid-based supply chains. In: NDSS. (2011)
-
(2011)
NDSS
-
-
Blass, E.O.1
Elkhiyaoui, K.2
Molva, R.3
-
13
-
-
84860657792
-
Checker: On-site checking in rfid-based supply chains
-
Elkhiyaoui, K., Blass, E.O., Molva, R.: Checker: on-site checking in rfid-based supply chains. In: WISEC. (2012) 173-184
-
(2012)
WISEC
, pp. 173-184
-
-
Elkhiyaoui, K.1
Blass, E.O.2
Molva, R.3
-
14
-
-
0032069741
-
Signature-based method for run-time fault detection in communication protocols
-
PII S0140366498001212
-
Noubir, G., Vijayananda, K., Nussbaumer, H.J.: Signature-based method for run-time fault detection in communication protocols. Computer Communications 21(5) (1998) 405-421 (Pubitemid 128393709)
-
(1998)
Computer Communications
, vol.21
, Issue.5
, pp. 405-421
-
-
Noubir, G.1
Vijayananda, K.2
Nussbaumer, H.J.3
-
15
-
-
56349132859
-
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
-
Boldyreva, A., Gentry, C., O'Neill, A., Yum, D.H.: Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. In: ACM Conference on Computer and Communications Security. (2007) 276-285
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 276-285
-
-
Boldyreva, A.1
Gentry, C.2
O'Neill, A.3
Yum, D.H.4
-
16
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: EUROCRYPT. (2003) 416-432
-
(2003)
EUROCRYPT
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
17
-
-
38149040922
-
Unrestricted aggregate signatures
-
Bellare, M., Namprempre, C., Neven, G.: Unrestricted aggregate signatures. In: ICALP. (2007) 411-422
-
(2007)
ICALP
, pp. 411-422
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
19
-
-
35048877778
-
Sequential aggregate signatures from trapdoor permutations
-
Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: EUROCRYPT. (2004) 74-90
-
(2004)
EUROCRYPT
, pp. 74-90
-
-
Lysyanskaya, A.1
Micali, S.2
Reyzin, L.3
Shacham, H.4
-
21
-
-
0024104968
-
A digital multisignature schema using bijective public-key cryptosystems
-
Okamoto, T.: A digital multisignature schema using bijective public-key cryptosystems. ACM Trans. Comput. Syst. 6(4) (1988) 432-441
-
(1988)
ACM Trans. Comput. Syst.
, vol.6
, Issue.4
, pp. 432-441
-
-
Okamoto, T.1
|