-
1
-
-
33750018373
-
Shoehorning security into the EPC tag standard
-
De Prisco, R., Yung, M. (Eds.) Springer, Heidelberg
-
Bailey, D.V., Juels, A.: Shoehorning Security into the EPC Tag Standard. In: De Prisco, R., Yung, M. (Eds.) SCN 2006. LNCS, Vol. 4116, pp. 303-320. Springer, Heidelberg (2006)
-
(2006)
SCN 2006. LNCS
, vol.4116
, pp. 303-320
-
-
Bailey, D.V.1
Juels, A.2
-
2
-
-
49849085550
-
-
Springer, Heidelberg
-
Blundo, C., Cimato, S. (eds.): SCN 2004. LNCS, Vol. 3352, pp. 149-164. Springer, Heidelberg (2005)
-
(2005)
SCN 2004. LNCS
, vol.3352
, pp. 149-164
-
-
Blundo, C.1
Cimato, S.2
-
3
-
-
78049323791
-
-
Springer, Heidelberg
-
Brassard, G. (ed.): CRYPTO 1989. LNCS, Vol. 435, pp. 416-427. Springer, Heidelberg (1990)
-
(1990)
CRYPTO 1989. LNCS
, vol.435
, pp. 416-427
-
-
Brassard, G.1
-
4
-
-
70350572865
-
Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection
-
Chen, C.-L., Deng, Y.-Y.: Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. Eng. Appl. of AI 22(8), 1284-1291 (2009)
-
(2009)
Eng. Appl. of AI
, vol.22
, Issue.8
, pp. 1284-1291
-
-
Chen, C.-L.1
Deng, Y.-Y.2
-
5
-
-
78751647681
-
The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
-
Chen, Y.-Y., Tsai, M.-L., Jan, J.-K.: The design of RFID access control protocol using the strategy of indefinite-index and challenge-response. Computer Communication 34(3), 250-256 (2011)
-
(2011)
Computer Communication
, vol.34
, Issue.3
, pp. 250-256
-
-
Chen, Y.-Y.1
Tsai, M.-L.2
Jan, J.-K.3
-
6
-
-
33751049043
-
Secure access control schemes for RFID systems with anonymity
-
IEEE Computer Society
-
Chien, H.-Y.: Secure Access Control Schemes for RFID Systems with Anonymity. In: MDM, page 96. IEEE Computer Society (2006)
-
(2006)
MDM
, pp. 96
-
-
Chien, H.-Y.1
-
7
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
-
Chien, H.-Y., Chen, C.-H.: Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces 29(2), 254-259 (2007)
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
8
-
-
68949181328
-
Anti-cloning protocol suitable to EPCglobal class-1 generation-2 RFID systems
-
Choi, E.Y., Lee, D.H., Lim, J.I.: Anti-cloning protocol suitable to EPCglobal class-1 generation-2 RFID systems. Computer Standards & Interfaces 31(6), 1124-1130 (2009)
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.6
, pp. 1124-1130
-
-
Choi, E.Y.1
Lee, D.H.2
Lim, J.I.3
-
9
-
-
84903845345
-
Class-1 generation 2 UHF air interface protocol standard version 1.2.0, gen2
-
Class-1 generation 2 UHF air interface protocol standard version 1.2.0, Gen2. In: Gen-2 Standard. EPCGlobal (2008), http://www.epcglobalinc.org/ standards/
-
(2008)
Gen-2 Standard
-
-
-
10
-
-
84981199109
-
A design principle for hash functions
-
Damgard, I.: A Design Principle for Hash Functions. In: Brassard [3], pp. 416-427
-
Brassard [3]
, pp. 416-427
-
-
Damgard, I.1
-
11
-
-
84903838439
-
Yearly report on algorithms and keysizes, technical report D.SPA.13Rev.1.0, ICT-2007-216676
-
January 4 ECRYPT (2010)
-
EPC Tag data standar dversion (January 4, 2008); Yearly report on algorithms and keysizes, Technical Report D.SPA.13Rev.1.0, ICT-2007-216676. In: Gen2 Standard. ECRYPT (2010), http://www.epcglobalinc.org/standards/
-
(2008)
Gen2 Standard
-
-
-
12
-
-
0003629990
-
-
FIPS National Institute for Standards and Technology (NIST) August
-
FIPS. Secure Hash Standard. National Institute for Standards and Technology (NIST) (August 2002)
-
(2002)
Secure Hash Standard
-
-
-
13
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
Hung-Yu, C: SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Transactions on Dependable and Secure Computing 4(4), 337-340 (2007)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Hung-Yu, C.1
-
15
-
-
84873150044
-
RFID authentication protocol conforming to EPC class-1 generation-2 standard
-
Arabnia, H.R., Daimi, K. (Eds.) CSREA Press
-
Jin, G., Jeong, E.Y., Jung, H.-Y., Lee, K.D.: RFID authentication protocol conforming to EPC class-1 generation-2 standard. In: Arabnia, H.R., Daimi, K. (Eds.) Security and Management, pp. 227-231. CSREA Press (2009)
-
(2009)
Security and Management
, pp. 227-231
-
-
Jin, G.1
Jeong, E.Y.2
Jung, H.-Y.3
Lee, K.D.4
-
16
-
-
38149000154
-
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
-
Denko, M.K., Shih, C.-s., Li, K.-C, Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (Eds.) Springer, Heidelberg
-
Lo, N.W., Yeh, K.-H.: An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. In: Denko, M.K., Shih, C.-s., Li, K.-C, Tsao, S.-L., Zeng, Q.-A., Park, S.H., Ko, Y.-B., Hung, S.-H., Park, J.-H. (Eds.) EUC-WS 2007. LNCS, Vol. 4809, pp. 43-56. Springer, Heidelberg (2007)
-
(2007)
EUC-WS 2007. LNCS
, vol.4809
, pp. 43-56
-
-
Lo, N.W.1
Yeh, K.-H.2
-
17
-
-
84937461306
-
One way hash functions and DES
-
Markle, R.: One way Hash Functions and DES. In: Brassard [3], pp. 428-446
-
Brassard [3]
, pp. 428-446
-
-
Markle, R.1
-
18
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Atluri, V., Pfitzmann, B., McDaniel, P.D. (Eds.) ACM
-
Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (Eds.) ACM Conference on Computer and Communications Security, pp. 210-219. ACM (2004)
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
19
-
-
0003629990
-
-
National Institute of Standards and Technology FIPS Publication 180 May
-
National Institute of Standards and Technology. Secure Hash Standard (SHS). FIPS Publication 180 (May 1993)
-
(1993)
Secure Hash Standard (SHS)
-
-
-
20
-
-
33744950331
-
Hash-chain based forward-secure privacy protection scheme for low-cost RFID
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proc. of the 2004 Symposium on Cryptography and Information Security (SCI 2004), pp. 719-724 (2004)
-
(2004)
Proc. of the 2004 Symposium on Cryptography and Information Security (SCI 2004)
, pp. 719-724
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
21
-
-
65649112157
-
Security analysis of the song mitchell authentication protocol for low-cost RFID tags
-
Rizomiliotis, S.G.P., Rekleitis, E.: Security analysis of the Song Mitchell authentication protocol for low-cost RFID tags. IEEE Communications Letters 13(4), 274-276 (2009)
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.4
, pp. 274-276
-
-
Rizomiliotis, S.G.P.1
Rekleitis, E.2
-
22
-
-
33750067948
-
M AP: A minimalist mutual-authentication protocol for low-cost RFID tags
-
Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (Eds.) Springer, Heidelberg
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (Eds.) UIC 2006. LNCS, Vol. 4159, pp. 912-923. Springer, Heidelberg (2006)
-
(2006)
UIC 2006. LNCS
, vol.4159
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
23
-
-
55749092929
-
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
-
Peris-Lopez, P., Castro, J.C.H., Estévez-Tapiador, J.M., Ribagorda, A.: Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards & Interfaces 31(2), 372-380 (2009)
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.2
, pp. 372-380
-
-
Peris-Lopez, P.1
Castro, J.C.H.2
Estévez-Tapiador, J.M.3
Ribagorda, A.4
-
24
-
-
85130015071
-
RFID specification revisited
-
Taylor & Francis Group
-
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID specification revisited. In: The Internet of Things: From RFID to The Next-Generation Pervasive Networked Systems, pp. 311-346. Taylor & Francis Group (2008)
-
(2008)
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems
, pp. 311-346
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
25
-
-
79959978275
-
Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol
-
Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.E., van der Lubbe, J.C.A.: Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol. Eng. Appl. of AI 24(6), 1061-1069 (2011)
-
(2011)
Eng. Appl. of AI
, vol.24
, Issue.6
, pp. 1061-1069
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Tapiador, J.E.3
Van Der Lubbe, J.C.A.4
-
26
-
-
70450265312
-
Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI
-
Phan, R.C.-W.: Cryptanalysis of a New Ultralightweight RFID Authentication Protocol - SASI. IEEE Transactions on Dependable and Secure Computing 6(4), 316-320 (2009)
-
(2009)
IEEE Transactions on Dependable and Secure Computing
, vol.6
, Issue.4
, pp. 316-320
-
-
Phan, R.C.-W.1
-
27
-
-
78650176848
-
RFID mutual authentication protocols
-
Piramuthu, S.: RFID mutual authentication protocols. Decision Support Systems 50(2), 387-393 (2011)
-
(2011)
Decision Support Systems
, vol.50
, Issue.2
, pp. 387-393
-
-
Piramuthu, S.1
-
28
-
-
2442450133
-
RFC 1321: The MD5 message-digest algorithm
-
April
-
Rivest, R.L.: RFC 1321: The MD5 Message-Digest Algorithm. Internet Activities Board (April 1992)
-
(1992)
Internet Activities Board
-
-
Rivest, R.L.1
-
29
-
-
80455173519
-
Tag impersonation attack on two RFID mutual authentication protocols
-
Safkhani, M., Bagheri, N., Naderi, M., Luo, Y., Chai, Q.: Tag Impersonation Attack on Two RFID Mutual Authentication Protocols. In: FARES (2011)
-
(2011)
FARES
-
-
Safkhani, M.1
Bagheri, N.2
Naderi, M.3
Luo, Y.4
Chai, Q.5
-
31
-
-
78751537668
-
A novel anonymous RFID authentication protocol providing strong privacy and security
-
Shen, J., Choi, D., Moh, S., Chung, I.: A Novel Anonymous RFID Authentication Protocol Providing Strong Privacy and Security. In: 2010 International Conference on Multimedia Information Networking and Security (2010)
-
(2010)
2010 International Conference on Multimedia Information Networking and Security
-
-
Shen, J.1
Choi, D.2
Moh, S.3
Chung, I.4
-
32
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
Song, B., Mitchell, C.J.: RFID Authentication Protocol for Low-cost Tags. In: WiSec 2008, pp. 140-147 (2008)
-
(2008)
WiSec 2008
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
33
-
-
79151469014
-
Scalable RFID security protocols supporting tag ownership transfer
-
Song, B., Mitchell, C.J.: Scalable RFID security protocols supporting tag ownership transfer. Computer Communications 34(4), 556-566 (2011)
-
(2011)
Computer Communications
, vol.34
, Issue.4
, pp. 556-566
-
-
Song, B.1
Mitchell, C.J.2
-
34
-
-
67649484364
-
A gen2-based RFID authentication protocol for security and privacy
-
Sun, H.-M., Ting, W.-C.: A Gen2-Based RFID Authentication Protocol for Security and Privacy. IEEE Transactions on Mobile Computing 8(8), 1052-1062 (2009)
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.8
, pp. 1052-1062
-
-
Sun, H.-M.1
Ting, W.-C.2
-
35
-
-
85008055668
-
Secure and serverless RFID authentication and search protocols
-
Tan, C.C., Sheng, B., Li, Q.: Secure and Serverless RFID Authentication and Search Protocols. IEEE Transactions on Wireless Communications 7(4), 1400-1407 (2008)
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.4
, pp. 1400-1407
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
36
-
-
79953083437
-
A mutual authentication protocol for RFID
-
Wei, C.-H., Hwang, M.-S., Chin, A.Y.: A Mutual Authentication Protocol for RFID. IT Professional 13(2), 20-24 (2011)
-
(2011)
IT Professional
, vol.13
, Issue.2
, pp. 20-24
-
-
Wei, C.-H.1
Hwang, M.-S.2
Chin, A.Y.3
-
38
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter, D., Müller, G., Stephan, W., Ullmann, M. (Eds.) Springer, Heidelberg
-
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (Eds.) Security in Pervasive Computing 2003. LNCS, Vol. 2802, pp. 201-212. Springer, Heidelberg (2004)
-
(2004)
Security in Pervasive Computing 2003. LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
40
-
-
74549147425
-
A light-weight mutual authentication protocol for ISO 18000-6B standard RFID system
-
Wu, W., Gu, Y.: A light-weight mutual authentication protocol for ISO 18000-6B standard RFID system. In: Proceedings of ICCTA 2009, pp. 21-25 (2009)
-
(2009)
Proceedings of ICCTA 2009
, pp. 21-25
-
-
Wu, W.1
Gu, Y.2
-
43
-
-
84903832031
-
Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard
-
in press, corrected proof
-
Yoon, E.-J.: Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Systems with Applications (in press, corrected proof, 2011)
-
(2011)
Expert Systems with Applications
-
-
Yoon, E.-J.1
|