-
2
-
-
34948883343
-
Ubiquitous computing in the real world: Lessons learnt from large scale RFID deployments
-
Konomi, S.; Roussos, G(2007)Ubiquitous computing in the real world: Lessons learnt from large scale RFID deploymentsPersonal and Ubiquitous Computing, 11(7), 507-521.
-
(2007)
Personal and Ubiquitous Computing
, vol.11
, Issue.7
, pp. 507-521
-
-
Konomi, S.1
Roussos, G.2
-
3
-
-
74049091231
-
EPC RFID tags in security applications: Passport cards, enhanced drivers licenses, and beyond
-
Koscher, K.; Juels, A.; Kohno, T.; Brajkovic, V(2008)EPC RFID tags in security applications: Passport cards, enhanced drivers licenses, and beyondIn 16th ACM conference on computer and communications security (pp33-42).
-
(2008)
16th ACM Conference on Computer and Communications Security
, pp. 33-42
-
-
Koscher, K.1
Juels, A.2
Kohno, T.3
Brajkovic, V.4
-
4
-
-
84875116626
-
Pathchecker: An RFID application for tracing products in supply-chains
-
Ouafi, K.; Vaudenay, S(2009)Pathchecker: An RFID application for tracing products in supply-chainsIn RFIDsec.
-
(2009)
RFIDsec
-
-
Ouafi, K.1
Vaudenay, S.2
-
9
-
-
78751648506
-
Defending RFID authentication protocols against DoS attacks
-
10.1016/j.comcom.2010.06.014
-
Duc, DN.; Kim, K(2011)Defending RFID authentication protocols against DoS attacksJournal of Computer Communications, 34, 384-390.
-
(2011)
Journal of Computer Communications
, vol.34
, pp. 384-390
-
-
Duc, D.N.1
Kim, K.2
-
10
-
-
78751647847
-
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
-
10.1016/j.comcom.2010.02.029
-
Cho, J.-S.; Yeo, S.-S.; Kim, SK(2011)Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret valueJournal of Computer Communications, 34, 391-397.
-
(2011)
Journal of Computer Communications
, vol.34
, pp. 391-397
-
-
Cho, J.-S.1
Yeo, S.-S.2
Kim, S.K.3
-
14
-
-
33744957484
-
Adversarial model for radio frequency identification
-
Avoine, G(2005)Adversarial model for radio frequency identificationCryptology ePrint archive, report 2005/049http://eprint.iacr.org/ 2005/049.
-
(2005)
Cryptology EPrint Archive, Report 2005/049
-
-
Avoine, G.1
-
16
-
-
33745621564
-
Reducing time complexity in RFID systems
-
BPreneel & STavares (Eds.) Heidelberg: Springer
-
Avoine, G.; Dysli, E.; Oechslin, P(2006)Reducing time complexity in RFID systemsIn BPreneel & STavares (Eds.), SAC 2005LNCS (Vol3897, pp291-306)Heidelberg: Springer.
-
(2006)
SAC 2005LNCS
, vol.3897
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
19
-
-
41549161615
-
Privacy of recent RFID authentication protocols
-
LChen, YMu, & WSusilo (Eds.) Heidelberg: Springer
-
Ouafi, K.; Phan, RC.-W(2008)Privacy of recent RFID authentication protocolsIn LChen, YMu, & WSusilo (Eds.), ISPEC 2008LNCS (Vol4991, pp263-277)Heidelberg: Springer.
-
(2008)
ISPEC 2008LNCS
, vol.4991
, pp. 263-277
-
-
Ouafi, K.1
Phan, C.R.-W.2
-
20
-
-
45749087762
-
Traceable privacy of recent provably-secure RFID Protocols
-
SMBellovin, et al(Eds.) Berlin, Heidelberg: Springer
-
Ouafi, K.; Phan, RC.-W(2008)Traceable privacy of recent provably-secure RFID ProtocolsIn SMBellovin, et al(Eds.), ACNS 2008LNCS (Vol5037, pp479-489)Berlin, Heidelberg: Springer.
-
(2008)
ACNS 2008LNCS
, vol.5037
, pp. 479-489
-
-
Ouafi, K.1
Phan, C.R.-W.2
-
23
-
-
38149038702
-
On privacy models for RFID
-
KKurosawa (Ed.) Heidelberg: Springer
-
Vaudenay, S(2007)On privacy models for RFIDIn KKurosawa (Ed.), ASIACRYPT 2007LNCS (Vol4833, pp68-87)Heidelberg: Springer.
-
(2007)
ASIACRYPT 2007LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
25
-
-
84856207915
-
Mutual authentication protocol for networked RFID systems
-
Fernando, H.; Abawajy, J(2011)Mutual authentication protocol for networked RFID systemsIn IEEE TrustComm.
-
(2011)
IEEE TrustComm
-
-
Fernando, H.1
Abawajy, J.2
-
26
-
-
80054909605
-
An improved forward-secure anonymous RFID authentication protocol
-
Zhu, H.; Zhao, Y.; Ding, S.; Jin, B(2011)An improved forward-secure anonymous RFID authentication protocolIn Wireless communications, networking and mobile computing (WiCOM) (pp1-5).
-
(2011)
Wireless Communications, Networking and Mobile Computing (WiCOM)
, pp. 1-5
-
-
Zhu, H.1
Zhao, Y.2
Ding, S.3
Jin, B.4
-
28
-
-
80052972135
-
A new RFID privacy model
-
VAtluri, CDiaz (Eds.)
-
Hermans, J.; Pashalidis, A.; Vercauteren, F& Preneel, B(2011)A new RFID privacy modelIn VAtluri, CDiaz (Eds.), ESORICS 2011LNCS (Vol6879, pp568-587).
-
(2011)
ESORICS 2011LNCS
, vol.6879
, pp. 568-587
-
-
Hermans, J.1
Pashalidis, A.2
Vercauteren, F.3
Preneel, B.4
-
30
-
-
70350383766
-
New privacy results on synchronized RFID authentication protocols against tag tracing
-
MBackes & PNing (Eds.) Heidelberg: Springer
-
Ng, CY.; Susilo, W.; Mu, Y.; Safavi-Naini, R(2009)New privacy results on synchronized RFID authentication protocols against tag tracingIn MBackes & PNing (Eds.), ESORICS 2009LNCS (Vol5789, pp321-336)Heidelberg: Springer.
-
(2009)
ESORICS 2009LNCS
, vol.5789
, pp. 321-336
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
31
-
-
78650151843
-
On RFID privacy with mutual authentication and tag corruption
-
Armknecht, F.; Sadeghi, A.; Scafuro, A.; Visconti, I& Wachsmann, C(2010)On RFID privacy with mutual authentication and tag corruptionIn Applied cryptography and network security (ACNS) 2010, LNCS (Vol6123, pp493-510).
-
(2010)
Applied Cryptography and Network Security (ACNS) 2010, LNCS
, vol.6123
, pp. 493-510
-
-
Armknecht, F.1
Sadeghi, A.2
Scafuro, A.3
Visconti, I.4
Wachsmann, C.5
-
32
-
-
78650590814
-
Impossibility results for RFID Privacy notions
-
Armknecht, F.; Sadeghi, A.; Scafuro, A.; Visconti, I.; Wachsmann, C(2010)Impossibility results for RFID Privacy notionsIn Transactions on computational science XI, LNCS, (Vol6480, pp39-63).
-
(2010)
Transactions on Computational Science XI, LNCS
, vol.6480
, pp. 39-63
-
-
Armknecht, F.1
Sadeghi, A.2
Scafuro, A.3
Visconti, I.4
Wachsmann, C.5
-
33
-
-
84903608391
-
Two RFID privacy models in front of a court
-
Habibi, MH.; Aref, MR(2011) Two RFID privacy models in front of a courtEprint IACR archivehttp://eprint.iacr.org/2011/625.
-
(2011)
Eprint IACR Archive
-
-
Habibi, M.H.1
Aref, M.R.2
-
35
-
-
78650076689
-
Time measurement threatens privacy-friendly RFID authentication protocols
-
Sprinfer LNCS
-
Avoine, G.; Coisel, I.; Martin, T(2010)Time measurement threatens privacy-friendly RFID authentication protocolsIn RFIDSecSprinfer LNCS (Vol6370, pp138-157).
-
(2010)
RFIDSec
, vol.6370
, pp. 138-157
-
-
Avoine, G.1
Coisel, I.2
Martin, T.3
-
37
-
-
80054073000
-
Extending an RFID security and privacy model by considering forward untraceability
-
Akgün, M.; Çaǧlayan, M(2011)Extending an RFID security and privacy model by considering forward untraceabilitySecurity and trust management LNCS, (Vol6710, pp239-254).
-
(2011)
Security and Trust Management LNCS
, vol.6710
, pp. 239-254
-
-
Akgün, M.1
Çaǧlayan, M.2
-
38
-
-
73149105959
-
An enhanced 2-pass optimistic anonymous RFID authentication protocol with forward security
-
He, L.; Jin, S.; Zhang, T.; Li, N(2009)An enhanced 2-pass optimistic anonymous RFID authentication protocol with forward securityIn WiCOM (pp1-4).
-
(2009)
WiCOM
, pp. 1-4
-
-
He, L.1
Jin, S.2
Zhang, T.3
Li, N.4
-
39
-
-
84864194805
-
The Hummingbird-2 lightweight authenticated encryption algorithm
-
Engels, D.; Saarinen, M.-JO.; Smith, EM(2011)The Hummingbird-2 lightweight authenticated encryption algorithmIn RFIDSec 2011.
-
(2011)
RFIDSec 2011
-
-
Engels, D.1
Saarinen, J.M.O.2
Smith, E.M.3
|