-
1
-
-
84907377571
-
-
EPCglobal. Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1. 2. 0: Gen 2, 2008
-
EPCglobal. Class-1 Generation 2 UHF Air Interface Protocol Standard Version 1. 2. 0: Gen 2, 2008, http://www.epcglobalinc.org/standards/
-
-
-
-
2
-
-
84907357486
-
-
Contactless SLE 66 Family
-
Infineon,. Contactless SLE 66 Family, http://www.infineon.com/
-
-
-
Infineon1
-
3
-
-
84907337523
-
-
DESFire Tags
-
NXP Semiconductors,. DESFire Tags, http://www.nxp.com/
-
-
-
Semiconductors, N.1
-
4
-
-
84907337522
-
-
Privacy-by-Design
-
Cavoukian A.,. Privacy-by-Design, http://privacybydesign.ca/
-
-
-
Cavoukian, A.1
-
6
-
-
33745621564
-
Reducing time complexity in RFID systems
-
Avoine G., Dysli E., Oechslin P., Reducing time complexity in RFID systems. 3897 Proceedings of the 12th International Conference on Selected Areas in Cryptography (SAC '05) 2005 Kingston, Canada Springer 291 306 Lecture Notes in Computer Science
-
Proceedings of the 12th International Conference on Selected Areas in Cryptography (SAC '05) 2005 Kingston, Canada Springer Lecture Notes in Computer Science
, vol.3897
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
8
-
-
14844294769
-
Privacy and security in library RFID issues, practices, and architectures
-
Molnar D., Wagner D., Privacy and security in library RFID issues, practices, and architectures. Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04) October 2004 Washington, DC, USA ACM 210 219 2-s2.0-14844294769
-
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04) October 2004 Washington, DC, USA ACM 2-s2.0-14844294769
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
9
-
-
33744957484
-
Adversary model for radio frequency identification
-
Lausanne, Switzerland Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC)
-
Avoine G., Adversary model for radio frequency identification. LASEC-REPORT 2005 2005-001 Lausanne, Switzerland Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC)
-
(2005)
LASEC-REPORT
-
-
Avoine, G.1
-
10
-
-
76849106311
-
Universally composable RFID identification and authentication protocols
-
ARTICLE 21 2-s2.0-76849106311 10.1145/1513601.1513603
-
Burmester M., van Le T., de Medeiros B., Tsudik G., Universally composable RFID identification and authentication protocols. ACM Transactions on Information and System Security 2009 12 4, article 21 2-s2.0-76849106311 10.1145/1513601.1513603
-
(2009)
ACM Transactions on Information and System Security
, vol.12
, Issue.4
-
-
Burmester, M.1
Van Le, T.2
De Medeiros, B.3
Tsudik, G.4
-
11
-
-
80052981225
-
-
Cryptology ePrint Archive, Report 2010/405, 2010
-
Canard S., Coisel I., Etrog J., Girault M., Privacy-preserving RFID systems: model and constructions. Cryptology ePrint Archive, Report 2010/405, 2010
-
Privacy-preserving RFID Systems: Model and Constructions
-
-
Canard, S.1
Coisel, I.2
Etrog, J.3
Girault, M.4
-
12
-
-
78049406406
-
A new framework for RFID Privacy
-
Deng R. H., Li Y., Yung M., Zhao Y., A new framework for RFID Privacy. 6345 Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS '10) 2010 Athens, Greece Springer 1 18 Lecture Notes in Computer Science
-
Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS '10) 2010 Athens, Greece Springer Lecture Notes in Computer Science
, vol.6345
, pp. 1-18
-
-
Deng, R.H.1
Li, Y.2
Yung, M.3
Zhao, Y.4
-
13
-
-
44649113207
-
Untraceability of RFID protocols
-
van Deursen T., Mauw S., Radomirović S., Untraceability of RFID protocols. 5019 Proceedings of the 2nd IFIP WG 11.2 International Conference on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks (WISTP '08) May 2008 Sevilla, Spain Springer 1 15 Lecture Notes in Computer Science
-
Proceedings of the 2nd IFIP WG 11.2 International Conference on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks (WISTP '08) May 2008 Sevilla, Spain Springer Lecture Notes in Computer Science
, vol.5019
, pp. 1-15
-
-
Van Deursen, T.1
Mauw, S.2
Radomirović, S.3
-
14
-
-
57049137188
-
A new formal proof model for RFID location privacy
-
Ha J.-H., Moon S.-J., Zhou J., Ha J.-C., A new formal proof model for RFID location privacy. 5283 Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS '08) 2008 Malaga, Spain Springer 267 281 Lecture Notes in Computer Science
-
Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS '08) 2008 Malaga, Spain Springer Lecture Notes in Computer Science
, vol.5283
, pp. 267-281
-
-
Ha, J.-H.1
Moon, S.-J.2
Zhou, J.3
Ha, J.-C.4
-
15
-
-
80052972135
-
A new RFID privacy model
-
Hermans J., Pashalidis A., Vercauteren F., Preneel B., A new RFID privacy model. 6879 Proceedings of the 16th European Symposium on Research in Computer Security (ESORICS '11) 2011 Leuven, Belgium Springer 568 587 Lecture Notes in Computer Science
-
Proceedings of the 16th European Symposium on Research in Computer Security (ESORICS '11) 2011 Leuven, Belgium Springer Lecture Notes in Computer Science
, vol.6879
, pp. 568-587
-
-
Hermans, J.1
Pashalidis, A.2
Vercauteren, F.3
Preneel, B.4
-
17
-
-
79956314470
-
Revisiting unpredictability-based RFID privacy models
-
Lai J., Deng R. H., Li Y., Revisiting unpredictability-based RFID privacy models. 6123 Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS '10) 2010 Beijing, China Springer 475 492 Lecture Notes in Computer Science
-
Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS '10) 2010 Beijing, China Springer Lecture Notes in Computer Science
, vol.6123
, pp. 475-492
-
-
Lai, J.1
Deng, R.H.2
Li, Y.3
-
19
-
-
74049095938
-
RFID privacy: Relation between two notions, minimal condition, and efficient construction
-
Ma C., Li Y., Deng R. H., Li T., RFID privacy: relation between two notions, minimal condition, and efficient construction. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09) November 2009 Chicago, Ill, USA ACM 54 65 2-s2.0-74049095938 10.1145/1653662.1653670
-
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09) November 2009 Chicago, Ill, USA ACM 2-s2.0-74049095938 10.1145/1653662.1653670
, pp. 54-65
-
-
Ma, C.1
Li, Y.2
Deng, R.H.3
Li, T.4
-
23
-
-
84855301780
-
A survey on privacy frameworks for RFID authentication
-
10.1587/transinf.E95.D.2
-
Su C., Li Y., Zhao Y., Deng R. H., Zhao Y., Zhou J., A survey on privacy frameworks for RFID authentication. IEICE Transactions on Information and Systems 2012 95 1 2 11 10.1587/transinf.E95.D.2
-
(2012)
IEICE Transactions on Information and Systems
, vol.95
, Issue.1
, pp. 2-11
-
-
Su, C.1
Li, Y.2
Zhao, Y.3
Deng, R.H.4
Zhao, Y.5
Zhou, J.6
-
26
-
-
78650590814
-
Impossibility results for RFID privacy notions
-
2-s2.0-78650590814 10.1007/978-3-642-17697-5-3
-
Armknecht F., Sadeghi A. R., Scafuro A., Visconti I., Wachsmann C., Impossibility results for RFID privacy notions. Transaction on Computational Science XI 2010 6480 39 63 2-s2.0-78650590814 10.1007/978-3-642-17697-5-3
-
(2010)
Transaction on Computational Science XI
, vol.6480
, pp. 39-63
-
-
Armknecht, F.1
Sadeghi, A.R.2
Scafuro, A.3
Visconti, I.4
Wachsmann, C.5
-
27
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Bellare M., Desai A., Pointcheval D., Rogaway P., Relations among notions of security for public-key encryption schemes. 1462 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '98) 1998 Santa Barbara, Calif, USA Springer 26 45 Lecture Notes in Computer Science
-
Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '98) 1998 Santa Barbara, Calif, USA Springer Lecture Notes in Computer Science
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
28
-
-
78650076689
-
Time measurement threatens privacy-friendly RFID authentication protocols
-
Avoine G., Coisel I., Martin T., Time measurement threatens privacy-friendly RFID authentication protocols. 6370 Proceedings of the 6th International Conference on Radio Frequency Identification: Security and Privacy Issues (RFIDSec '10) 2010 Istanbul, Turkey Springer 138 157 Lecture Notes in Computer Science
-
Proceedings of the 6th International Conference on Radio Frequency Identification: Security and Privacy Issues (RFIDSec '10) 2010 Istanbul, Turkey Springer Lecture Notes in Computer Science
, vol.6370
, pp. 138-157
-
-
Avoine, G.1
Coisel, I.2
Martin, T.3
-
29
-
-
77049116572
-
Revisiting DoS attacks and privacy in RFID-enabled networks
-
D'Arco P., Scafuro A., Visconti I., Revisiting DoS attacks and privacy in RFID-enabled networks. 5804 Proceedings of the 5th International Workshop on Algorithmic Aspects of Wireless Sensor Networks (ALGOSENSORS '09) 2009 Rhodes, Greece Springer 76 87 Lecture Notes in Computer Science
-
Proceedings of the 5th International Workshop on Algorithmic Aspects of Wireless Sensor Networks (ALGOSENSORS '09) 2009 Rhodes, Greece Springer Lecture Notes in Computer Science
, vol.5804
, pp. 76-87
-
-
D'Arco, P.1
Scafuro, A.2
Visconti, I.3
-
33
-
-
0020720357
-
On the security of public key protocols
-
2-s2.0-0020720357 10.1109/TIT.1983.1056650
-
Dolev D., Yao A. C., On the security of public key protocols. IEEE Transactions on Information Theory 1983 29 2 198 208 2-s2.0-0020720357 10.1109/TIT.1983.1056650
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
34
-
-
31844437820
-
-
ACM Workshop on Formal Methods in Security Engineering (FMSE '05) November 2005 Alexandria, VA, USA ACM 2-s2.0-31844437820
-
Garcia F. D., Hasuo I., Pieters W., van Rossum P., Provable anonymity. ACM Workshop on Formal Methods in Security Engineering (FMSE '05) November 2005 Alexandria, VA, USA ACM 63 72 2-s2.0-31844437820
-
Provable Anonymity
, pp. 63-72
-
-
Garcia, F.D.1
Hasuo, I.2
Pieters, W.3
Van Rossum, P.4
-
35
-
-
31844446595
-
A formalization of anonymity and onion routing
-
Mauw S., Verschuren J. H. S., de Vink E. P., A formalization of anonymity and onion routing. 3193 Proceedings of the 9th European Symposium on Research in Computer Security (ESORICS '04) 2004 Sophia Antipolis, France Springer 109 124 Lecture Notes in Computer Science
-
Proceedings of the 9th European Symposium on Research in Computer Security (ESORICS '04) 2004 Sophia Antipolis, France Springer Lecture Notes in Computer Science
, vol.3193
, pp. 109-124
-
-
Mauw, S.1
Verschuren, J.H.S.2
De Vink, E.P.3
-
37
-
-
84907377568
-
-
International Organization For Standardization ISO/IEC, 9798: Information technology - Security techniques - Entity authentication, 1991-2010
-
International Organization for Standardization,. ISO/IEC, 9798: Information technology-Security techniques-Entity authentication, 1991-2010
-
-
-
-
38
-
-
84907337518
-
-
RFID Privacy Workshop November 2003 Cambridge, Mass, USA MIT
-
Ohkubo M., Suzuki K., Kinoshita S., Cryptographic approach to "privacy-friendly" tags. RFID Privacy Workshop November 2003 Cambridge, Mass, USA MIT
-
Cryptographic Approach to "privacy-friendly" Tags
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
41
-
-
79952958289
-
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
-
2-s2.0-79952958289 10.3233/JCS-2010-0407
-
Hancke G. P., Practical eavesdropping and skimming attacks on high-frequency RFID tokens. Journal of Computer Security 2011 19 2 259 288 2-s2.0-79952958289 10.3233/JCS-2010-0407
-
(2011)
Journal of Computer Security
, vol.19
, Issue.2
, pp. 259-288
-
-
Hancke, G.P.1
-
43
-
-
78650145371
-
Tree-based RFID authentication protocols are definitively not privacy-friendly
-
Avoine G., Martin B., Martin T., Tree-based RFID authentication protocols are definitively not privacy-friendly. 6370 Proceedings of the 6th International Conference on Radio Frequency Identification: Security and Privacy Issues (RFIDSec '10) 2010 Istanbul, Turkey Springer 103 122 Lecture Notes in Computer Science
-
Proceedings of the 6th International Conference on Radio Frequency Identification: Security and Privacy Issues (RFIDSec '10) 2010 Istanbul, Turkey Springer Lecture Notes in Computer Science
, vol.6370
, pp. 103-122
-
-
Avoine, G.1
Martin, B.2
Martin, T.3
-
44
-
-
45749087762
-
Traceable privacy of recent provably-secure RFID protocols
-
Ouafi K., Phan R. C. W., Traceable privacy of recent provably-secure RFID protocols. 5037 Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS '08) June 2008 New York City, NY, USA Springer 479 489 Lecture Notes in Computer Science
-
Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS '08) June 2008 New York City, NY, USA Springer Lecture Notes in Computer Science
, vol.5037
, pp. 479-489
-
-
Ouafi, K.1
Phan, R.C.W.2
|