-
2
-
-
32444435813
-
Radio frequency identification (rfid)
-
DOI 10.1016/j.cose.2005.12.003, PII S016740480500204X
-
C. Roberts. Radio frequency identification (RFID). Journal of Computers and Security, 25:18-26, 2006. (Pubitemid 43227228)
-
(2006)
Computers and Security
, vol.25
, Issue.1
, pp. 18-26
-
-
Roberts, C.M.1
-
3
-
-
50249114107
-
Body area network and its standardization at ieee 802.15.mban
-
L. Huan-Bang, K. Takizawa, Z. Bin, and R. Kohno. Body Area Network and Its Standardization at IEEE 802.15.MBAN. In Mobile and Wireless Communications Summit, pages 1-5, 2007.
-
(2007)
Mobile and Wireless Communications Summit
, pp. 1-5
-
-
Huan-Bang, L.1
Takizawa, K.2
Bin, Z.3
Kohno, R.4
-
4
-
-
84902656178
-
Technical challenges of human ict implants
-
N. Gasson, E. Kosta, and D. Bowman. Technical Challenges of Human ICT Implants. In Human ICT Implants: Technical, Legal and Ethical Considerations, pages 55-63, 2012.
-
(2012)
Human ICT Implants: Technical, Legal and Ethical Considerations
, pp. 55-63
-
-
Gasson, N.1
Kosta, E.2
Bowman, D.3
-
5
-
-
33745654539
-
RFID-tags for anti-counterfeiting
-
Springer Verlag
-
P. Tuyls and L. Batina. RFID-tags for Anti-Counterfeiting. In Topics in Cryptology, pages 115-131. Springer Verlag, 2006.
-
(2006)
Topics in Cryptology
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
6
-
-
84989949883
-
Anti-counterfeiting, untraceability and other security challenges for rfid
-
Springer
-
Y. Lee, L. Batina, D. Singele, B. Preneel, and I. Verbauwhede. Anti-counterfeiting, Untraceability and Other Security Challenges for RFID. In Towards Hardware-Intrinsic Security, pages 237-257. Springer, 2010.
-
(2010)
Towards Hardware-Intrinsic Security
, pp. 237-257
-
-
Lee, Y.1
Batina, L.2
Singele, D.3
Preneel, B.4
Verbauwhede, I.5
-
7
-
-
34547688845
-
Public-key cryptography for rfid-tags
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede. Public-Key Cryptography for RFID-Tags. In Pervasive Computing and Communications Workshops, pages 217-222, 2007.
-
(2007)
Pervasive Computing and Communications Workshops
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
8
-
-
49049105964
-
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
-
IEEE International Conference on
-
K. Yong, L. Batina, and I. Verbauwhede. EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol. In RFID, 2008 IEEE International Conference on, pages 97-104, 2008.
-
(2008)
RFID 2008
, pp. 97-104
-
-
Yong, K.1
Batina, L.2
Verbauwhede., I.3
-
9
-
-
84902666519
-
A secure ecc-based rfid authentication scheme integrated with id-verifier transfer protocol
-
Yi-Pin Liao and Chih-Ming Hsiao. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 2013.
-
(2013)
Ad Hoc Networks
-
-
Liao, Y.1
Hsiao, C.2
-
10
-
-
79961143767
-
An ecdlp-based randomized key rfid authentication protocol
-
Xinglei Zhang, Jianhua Li, Yue Wu, and Quanhai Zhang. An ECDLP-Based Randomized Key RFID Authentication Protocol. In Network Computing and Information Security (NCIS), 2011 International Conference on, volume 2, pages 146-149, 2011.
-
(2011)
Network Computing and Information Security (NCIS), 2011 International Conference on
, vol.2
, pp. 146-149
-
-
Zhang, X.1
Li, J.2
Wu, Y.3
Zhang, Q.4
-
12
-
-
84878498447
-
Quark: A lightweight hash
-
J. Aumasson, L. Henzen, W. Meier, J. Miret, and M. Plasencia. Quark: A Lightweight Hash. Journal of Cryptography, 26(2):313-339, 2013.
-
(2013)
Journal of Cryptography
, vol.26
, Issue.2
, pp. 313-339
-
-
Aumasson, J.1
Henzen, L.2
Meier, W.3
Miret, J.4
Plasencia, M.5
-
13
-
-
0017930809
-
METHOD for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Journal of Association for Computing Machinery, 21(2):120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
14
-
-
78650114205
-
A lightweight implementation of keccak hash function for radio-frequency identification applications
-
E. Kavun and T. Yalcin. A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications. In Radio Frequency Identification: Security and Privacy Issues, volume 6370, pages 258-269, 2010.
-
(2010)
Radio Frequency Identification: Security and Privacy Issues
, vol.6370
, pp. 258-269
-
-
Kavun, E.1
Yalcin, T.2
-
15
-
-
84902676752
-
Specification analysis for secure rfid implant systems
-
S. Rahimi, A. Hakkala, J. Isoaho, S. Virtanen, and J. Isoaho. Specification Analysis for Secure RFID Implant Systems. Journal of Computer Theory and Engineering, 6(2):177-189, 2014.
-
(2014)
Journal of Computer Theory and Engineering
, vol.6
, Issue.2
, pp. 177-189
-
-
Rahimi, S.1
Hakkala, A.2
Isoaho, J.3
Virtanen, S.4
Isoaho, J.5
-
16
-
-
65249186388
-
A secure elliptic curve-based rfid protocol
-
S. Martinez, M. valls, C. Roing, J. Miret, and F. Gine. A Secure Elliptic Curve-Based RFID Protocol. Journal of Computer Science and Technology, 24(2):309-318, 2009.
-
(2009)
Journal of Computer Science and Technology
, vol.24
, Issue.2
, pp. 309-318
-
-
Martinez, S.1
Valls, M.2
Roing, C.3
Miret, J.4
Gine, F.5
-
17
-
-
82155181956
-
Elliptic curve cryptography based authentication protocol for low-cost rfid tags
-
IEEE International Conference on
-
G. Godor and S. Imre. Elliptic curve cryptography based authentication protocol for low-cost RFID tags. In RFID-Technologies and Applications (RFID-TA), 2011 IEEE International Conference on, pages 386-393, 2011.
-
(2011)
RFID-Technologies and Applications (RFID-TA) 2011
, pp. 386-393
-
-
Godor, G.1
Imre, S.2
-
19
-
-
67249143972
-
Mutual authentication protocol for low computational capacity rfid systems
-
IEEE GLOBECOM 2008. IEEE
-
G. Godor, M. Antal, and S. Imre. Mutual Authentication Protocol for Low Computational Capacity RFID Systems. In Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, pages 1-5, 2008.
-
(2008)
Global Telecommunications Conference 2008
, pp. 1-5
-
-
Godor, G.1
Antal, M.2
Imre, S.3
-
20
-
-
34548815120
-
Are standards compliant elliptic curve cryptosystems feasible on rfid?
-
S. Kumar and C. Paar. Are standards compliant elliptic curve cryptosystems feasible on rfid? In In Proc. of RFIDSec06, 2006.
-
(2006)
Proc. of RFIDSec06
-
-
Kumar, S.1
Paar, C.2
|