-
1
-
-
70350247896
-
Lightweight secure search protocols for low-cost RFID systems
-
Jun
-
L. Kulseng, Z. Yu, Y. Wei, and Y. Guan, "Lightweight Secure Search Protocols for Low-cost RFID Systems," 2009 29th IEEE International Conference on Distributed Computing Systems, pp. 40-48, Jun 2009.
-
(2009)
2009 29th IEEE International Conference on Distributed Computing Systems
, pp. 40-48
-
-
Kulseng, L.1
Yu, Z.2
Wei, Y.3
Guan, Y.4
-
2
-
-
84870065586
-
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
-
July. [Online]. Available: 10. 1016/j. adhoc. 2012. 06. 015
-
R. Doss, S. Sundaresan, and W. Zhou, "A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems," Ad Hoc Networks, July 2012. [Online]. Available: 10. 1016/j. adhoc. 2012. 06. 015
-
(2012)
Ad Hoc Networks
-
-
Doss, R.1
Sundaresan, S.2
Zhou, W.3
-
3
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
A. Juels and S. Weiss, "Authenticating Pervasive Devices with Human Protocols," Advances in Cryptology (CRYPTO 2005), Lecture Notes in Computer Science, vol. 3621, pp. 293-308, 2005.
-
(2005)
Advances in Cryptology (CRYPTO 2005), Lecture Notes in Computer Science
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weiss, S.2
-
4
-
-
58049152104
-
ERAP: ECc based rfid authentication protocol
-
S. Ahamed, F. Rahman, and M. Hoque, "ERAP: ECC based RFID Authentication Protocol," in 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008, pp. 219-225.
-
(2008)
12th IEEE International Workshop on Future Trends of Distributed Computing Systems
, pp. 219-225
-
-
Ahamed, S.1
Rahman, F.2
Hoque, M.3
-
5
-
-
35348832191
-
An elliptic curve processor suitable for rfid-tags
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "An elliptic curve processor suitable for rfid-tags," Cryptology ePrint Archive, Report 2006/227, 2006.
-
(2006)
Cryptology EPrint Archive, Report 2006/227
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
6
-
-
54049143316
-
Elliptic curve based security processor for rfid
-
Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic Curve Based Security Processor for RFID," IEEE Transactions on Computers, vol. 57, no. 11, pp. 1514-1527, 2008.
-
(2008)
IEEE Transactions on Computers
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
7
-
-
33845429016
-
A case against currently used hash functions in rfid protocols
-
Nov
-
M. Feldhofer and C. Rechberger, "A Case Against Currently Used Hash Functions in RFID Protocols," in On the Move to Meaningful Internet Systems 2006-OTM 2006, ser. Lecture Notes in Computer Science, vol. 4277, Nov 2006, pp. 372-381.
-
(2006)
On the Move to Meaningful Internet Systems 2006-OTM 2006, Ser. Lecture Notes in Computer Science
, vol.4277
, pp. 372-381
-
-
Feldhofer, M.1
Rechberger, C.2
-
9
-
-
0035163054
-
Univerally composable security: A new paradigm for cryptographic protocols
-
"Univerally Composable Security: A new paradigm for cryptographic protocols," IEEE Symp. On Foundations of Computer Science (FOCS 2001), pp. 136-145, 2001.
-
(2001)
IEEE Symp. on Foundations of Computer Science (FOCS 2001
, pp. 136-145
-
-
-
10
-
-
76849115734
-
The tag authentication scheme using self-shrinking generator on RFID system
-
H. Lee and D. Hong, "The tag authentication scheme using self-shrinking generator on RFID system," Transactions on Engineering, Computing and Technology, vol. 18, pp. 52-57, 2006.
-
(2006)
Transactions on Engineering, Computing and Technology
, vol.18
, pp. 52-57
-
-
Lee, H.1
Hong, D.2
-
11
-
-
57149100147
-
An efficient and secure RFID security method with ownership transfer
-
Nov
-
K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, "An Efficient and Secure RFID Security Method with Ownership Transfer," in 2006 International Conference on Computational Intelligence and Security. IEEE, Nov 2006, pp. 1090-1095.
-
(2006)
2006 International Conference on Computational Intelligence and Security. IEEE
, pp. 1090-1095
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
13
-
-
77949415170
-
Vulnerabilities in some recently proposed RFID ownership transfer protocols
-
Mar
-
G. Kapoor and S. Piramuthu, "Vulnerabilities in some recently proposed RFID ownership transfer protocols," IEEE Communications Letters, vol. 14, no. 3, pp. 260-262, Mar 2010.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.3
, pp. 260-262
-
-
Kapoor, G.1
Piramuthu, S.2
-
14
-
-
70349120905
-
Enhancement of the RFID security method with ownership transfer
-
Jan
-
H. Chen, W. Lee, Y. Zhao, and Y. Chen, "Enhancement of the RFID Security Method with Ownership Transfer," in 3rd Int. Conf. Ubiquitous Information Management and Communication (ICUIMC 09), Jan 2009, pp. 251-254.
-
(2009)
3rd Int. Conf. Ubiquitous Information Management and Communication (ICUIMC 09)
, pp. 251-254
-
-
Chen, H.1
Lee, W.2
Zhao, Y.3
Chen, Y.4
-
16
-
-
77953303552
-
Lighweight mutual authentication and ownership transfer for rfid systems
-
Mar
-
L. Kuseng, Z. Yu, Y. Wei, and Y. Guan, "Lighweight Mutual Authentication and Ownership Transfer for RFID Systems," in IEEE INFOCOM 2010, Mar 2010, pp. 1-5.
-
(2010)
IEEE INFOCOM 2010
, pp. 1-5
-
-
Kuseng, L.1
Yu, Z.2
Wei, Y.3
Guan, Y.4
-
17
-
-
59249097693
-
A simple privacy protecting scheme enabling delegation and ownership transfer for rfid tags
-
Nov
-
S. Fouladgar and H. Afifi, "A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags," Journal of Communications, vol. 2, no. 6, pp. 6-13, Nov 2007.
-
(2007)
Journal of Communications
, vol.2
, Issue.6
, pp. 6-13
-
-
Fouladgar, S.1
Afifi, H.2
-
18
-
-
59249086568
-
A lightweight protocol enabling ownership transfer and granular data access of RFID tags
-
Y. Seo, T. Asano, H. Lee, and K. Kim, "A lightweight protocol enabling ownership transfer and granular data access of RFID tags," in 2007 Symposium on Cryptography and Information Security, 2007, pp. 23-26.
-
(2007)
2007 Symposium on Cryptography and Information Security
, pp. 23-26
-
-
Seo, Y.1
Asano, T.2
Lee, H.3
Kim, K.4
-
19
-
-
79151469014
-
Scalable RFID security protocols supporting tag ownership transfer
-
Apr
-
B. Song and C. J. Mitchell, "Scalable RFID security protocols supporting tag ownership transfer," Computer Communications, vol. 34, no. 4, pp. 556-566, Apr 2011.
-
(2011)
Computer Communications
, vol.34
, Issue.4
, pp. 556-566
-
-
Song, B.1
Mitchell, C.J.2
-
20
-
-
80054907177
-
Single RFID Tag Ownership Transfer Protocols
-
G. Kapoor and S. Piramuthu, "Single RFID Tag Ownership Transfer Protocols," IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 99, pp. 1-10, 2011.
-
(2011)
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
, vol.99
, pp. 1-10
-
-
Kapoor, G.1
Piramuthu, S.2
-
21
-
-
84872713391
-
Secure RFID tag ownership transfer based on quadratic residues
-
Feb. 2013
-
R. Doss, W. Zhou, and S. Yu, "Secure RFID Tag Ownership Transfer Based on Quadratic Residues," IEEE Transactions On Information Forensics And Security, vol. 8, no. 2, pp. 390-401, Feb 2013.
-
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.2
, pp. 390-401
-
-
Doss, R.1
Zhou, W.2
Yu, S.3
-
22
-
-
70350399643
-
Secure ownership and ownership transfer in RFID systems
-
T. van Deursen, S. Mauw, S. Radomirovic, and P. Vullers, "Secure Ownership and Ownership Transfer in RFID Systems," European Symposium on Research in Computer Security (ECORICS) 2009 (LNCS 5789), pp. 637-654, 2009.
-
(2009)
European Symposium on Research in Computer Security (ECORICS) 2009 (LNCS 5789
, pp. 637-654
-
-
Van Deursen, T.1
Mauw, S.2
Radomirovic, S.3
Vullers, P.4
|