-
1
-
-
84883171665
-
Privacy-friendly authentication in RFID systems: On sub-linear protocols based on symmetric-key cryptography
-
G. Avoine, M. Bingol, X. Carpent, and S. Yalcin Privacy-friendly authentication in RFID systems: on sub-linear protocols based on symmetric-key cryptography IEEE Transactions on Mobile Computing 12 2013 2037 2049
-
(2013)
IEEE Transactions on Mobile Computing
, vol.12
, pp. 2037-2049
-
-
Avoine, G.1
Bingol, M.2
Carpent, X.3
Yalcin, S.4
-
3
-
-
70350424442
-
An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
-
G. Avoine, and A. Tchamkerten An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement Proceedings of the Conference on Information Security (ISC) 2009 250 261
-
(2009)
Proceedings of the Conference on Information Security (ISC)
, pp. 250-261
-
-
Avoine, G.1
Tchamkerten, A.2
-
4
-
-
84994129489
-
Hybrid tag includes active RFID, GPS, satellite and sensors
-
B. Bacheldor Hybrid tag includes active RFID, GPS, satellite and sensors RFID Journal February 24 2009
-
(2009)
RFID Journal
-
-
Bacheldor, B.1
-
6
-
-
84866021748
-
On the pseudorandom function assumption in (secure) distance-bounding protocols - PRF-ness alone does not stop the frauds!
-
I. Boureanu, A. Mitrokotsa, and S. Vaudenay On the pseudorandom function assumption in (secure) distance-bounding protocols - PRF-ness alone does not stop the frauds! Proceedings of LATINCRYPT 2012 100 120
-
(2012)
Proceedings of LATINCRYPT
, pp. 100-120
-
-
Boureanu, I.1
Mitrokotsa, A.2
Vaudenay, S.3
-
8
-
-
84976295016
-
Distance-bounding protocols. Advances in cryptology - EUROCRYPT '93
-
S. Brands, and D. Chaum Distance-bounding protocols. Advances in cryptology - EUROCRYPT '93 Lecture Notes in Computer Science 765 1994 344 359
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
12
-
-
1542341270
-
Location-based authentication: Grounding cyberspace for better security
-
D.E. Denning, and P.F. MacDoran Location-based authentication: grounding cyberspace for better security Computer Fraud & Security Feb. 1996 12 16
-
(1996)
Computer Fraud & Security
, pp. 12-16
-
-
Denning, D.E.1
Macdoran, P.F.2
-
18
-
-
84866028865
-
Provably secure distance-bounding: An analysis of prominent protocols
-
M. Fischlin, and C. Onete Provably secure distance-bounding: an analysis of prominent protocols IACR Cryptology ePrint Archive 2012 128 2012
-
(2012)
IACR Cryptology EPrint Archive 2012
, vol.128
-
-
Fischlin, M.1
Onete, C.2
-
22
-
-
84861619902
-
Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model
-
T. Halevi, S. Lin, D. Ma, A.K. Prasad, N. Saxena, J. Voris, and T. Xiang Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom) 2012 227 234
-
(2012)
Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom)
, pp. 227-234
-
-
Halevi, T.1
Lin, S.2
Ma, D.3
Prasad, A.K.4
Saxena, N.5
Voris, J.6
Xiang, T.7
-
29
-
-
67049155493
-
The Swiss-knife RFID distance bounding protocol
-
C.H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira The Swiss-knife RFID distance bounding protocol Proceedings of the International Conference on Information Security and Cryptology (ICISC) 2008 98 115
-
(2008)
Proceedings of the International Conference on Information Security and Cryptology (ICISC)
, pp. 98-115
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
33
-
-
65249186388
-
A secure elliptic curve-based RFID protocol
-
S. Martínez, M. Valla, C. Roig, J.M. Miret, and F. Giné A secure elliptic curve-based RFID protocol Journal of Computer Science and Technology 24 2 2009 309 318
-
(2009)
Journal of Computer Science and Technology
, vol.24
, Issue.2
, pp. 309-318
-
-
Martínez, S.1
Valla, M.2
Roig, C.3
Miret, J.M.4
Giné, F.5
-
35
-
-
17044439481
-
Battery-free wireless identification and sensing
-
M. Philipose, J.R. Smith, B. Jiang, K. Sundara-Rajan, A. Mamishev, and S. Roy Battery-free wireless identification and sensing IEEE Pervasive Computing 4 1 January-March 2005 37 45
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.1
, pp. 37-45
-
-
Philipose, M.1
Smith, J.R.2
Jiang, B.3
Sundara-Rajan, K.4
Mamishev, A.5
Roy, S.6
-
36
-
-
33947538532
-
Protocols for RFID reader/tag authentication
-
S. Piramuthu Protocols for RFID reader/tag authentication Decision Support Systems 43 3 April 2007 897 914
-
(2007)
Decision Support Systems
, vol.43
, Issue.3
, pp. 897-914
-
-
Piramuthu, S.1
-
37
-
-
78650176848
-
RFID mutual authentication protocols
-
S. Piramuthu RFID mutual authentication protocols Decision Support Systems 50 2 January 2011 387 393
-
(2011)
Decision Support Systems
, vol.50
, Issue.2
, pp. 387-393
-
-
Piramuthu, S.1
-
42
-
-
67649484364
-
A Gen2-based RFID authentication protocol for security and privacy
-
H.-M. Sun, and W.-C. Ting A Gen2-based RFID authentication protocol for security and privacy IEEE Transactions on Mobile Computing 8 8 2009 1052 1062
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.8
, pp. 1052-1062
-
-
Sun, H.-M.1
Ting, W.-C.2
-
45
-
-
84881117795
-
Framework and authentication protocols for smartphone, NFC, and RFID in retail transactions
-
P. Urien, and S. Piramuthu Framework and authentication protocols for smartphone, NFC, and RFID in retail transactions Proceedings of the IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) 2013 77 82
-
(2013)
Proceedings of the IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
, pp. 77-82
-
-
Urien, P.1
Piramuthu, S.2
-
46
-
-
79951677671
-
Distance bounding protocol for mutual authentication
-
D.H. Yum, J.S. Kim, S.J. Hong, and P.J. Lee Distance bounding protocol for mutual authentication IEEE Transactions on Wireless Communications 10 2 2011 592 601
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.2
, pp. 592-601
-
-
Yum, D.H.1
Kim, J.S.2
Hong, S.J.3
Lee, P.J.4
-
47
-
-
84868671331
-
Simultaneous multi-level RFID tag ownership & transfer in health care environments
-
W. Zhou, E.J. Yoon, and S. Piramuthu Simultaneous multi-level RFID tag ownership & transfer in health care environments Decision Support Systems 54 1 December 2012 98 108
-
(2012)
Decision Support Systems
, vol.54
, Issue.1
, pp. 98-108
-
-
Zhou, W.1
Yoon, E.J.2
Piramuthu, S.3
-
48
-
-
84878353812
-
Preventing ticket-switching of RFID-tagged items in apparel retail stores
-
W. Zhou, and S. Piramuthu Preventing ticket-switching of RFID-tagged items in apparel retail stores Decision Support Systems 55 3 June 2013 802 810
-
(2013)
Decision Support Systems
, vol.55
, Issue.3
, pp. 802-810
-
-
Zhou, W.1
Piramuthu, S.2
|