-
1
-
-
84949498364
-
-
EPC global
-
EPC global, link: http://www.gs1. org/epcglobal
-
-
-
-
2
-
-
84949502237
-
-
http://rfid. net/basics/186-iso-rfid-standards-a-complete-list
-
-
-
-
3
-
-
33847269759
-
Picking virtual pockets using relay attacks on contactless smartcard systems
-
Athens, Greece, 5-9 September
-
Ziv Kfir and Avishai Wool. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. n SecureComm 2005, Athens, Greece, 5-9 September., pages 47-58
-
N SecureComm 2005
, pp. 47-58
-
-
Kfir, Z.1
Wool, A.2
-
4
-
-
33751067978
-
Practical attacks on proximity identification systems
-
Berkeley/Oakland, California, USA, 21-24 May
-
Gerhard P. Hancke. Practical Attacks on Proximity Identification Systems. In IEEE Security and Privacy-S&P 2006, Berkeley/Oakland, California, USA, 21-24 May, pages 328-333
-
(2006)
IEEE Security and Privacy-S&P
, pp. 328-333
-
-
Gerhard, P.1
Hancke2
-
5
-
-
82155192527
-
Weaknesses of the ISO/IEC 14443 protocol regarding relay attacks
-
Barcelona, Spain, September 15-16
-
Wolfgang Issovits and Michael Hutter. Weaknesses of the ISO/IEC 14443 Protocol Regarding Relay Attacks. In RFID-TA 2011, Barcelona, Spain, September 15-16., pages 335-342
-
(2011)
RFID-TA
, pp. 335-342
-
-
Issovits, W.1
Hutter, M.2
-
6
-
-
81455132091
-
On the weakness of contactless systems under relay attacks
-
Pierre-Henri Thevenon, Olivier Savry, and Smail Tedjini. On the weakness of contactless systems under relay attacks. In SoftCOM 2011, pages 1-5
-
(2011)
SoftCOM
, pp. 1-5
-
-
Thevenon, P.1
Savry, O.2
Tedjini, S.3
-
7
-
-
33847329743
-
An RFID distance bounding protocol
-
Athens, Greece, 5-9 September.
-
Gerhard Hancke and Markus Kuhn. An RFID Distance Bounding Protocol. In SecureComm 2005, Athens, Greece, 5-9 September., pages 67-73.
-
(2005)
SecureComm
, pp. 67-73
-
-
Hancke, G.1
Kuhn, M.2
-
8
-
-
38149113034
-
Distance bounding protocols with void-challengesnfor RFID
-
Graz, Austria, July 12-14
-
Jorge Munilla, Andres Ortiz, and Alberto Peinado. Distance Bounding Protocols with void-challengesnfor RFID. In RFIDSec 2006, Graz, Austria, July 12-14
-
(2006)
RFIDSec
-
-
Munilla, J.1
Ortiz, A.2
Peinado, A.3
-
9
-
-
34748825630
-
Detecting relay attacks with timing based protocols
-
Singapore, March 20-22
-
Jason Reid, Juan Gonzalez Neito, Tee Tang, and Bouchra Senadji. Detecting Relay Attacks with Timing Based Protocols. ASIACCS, Singapore, March 20-22, 2007
-
(2007)
ASIACCS
-
-
Reid, J.1
Gonzalez Neito, J.2
Tang, T.3
Senadji, B.4
-
10
-
-
0004239952
-
-
Carl Hanser Verlag, 2nd edition, April
-
Klaus Finkenzeller. RFID-Handbook. Carl Hanser Verlag, 2nd edition, April 2003. ISBN 0-470-84402-7
-
(2003)
RFID-Handbook
-
-
Finkenzeller, K.1
-
11
-
-
33847269759
-
Picking virtual pockets using relay attacks on contactless smartcards
-
Los Alamitos, CA, USA), IEEE Computer Society
-
Ziv Kfir and Avishai Wool, Picking virtual pockets using relay attacks on contactless smartcards, International Conference on Security and Privacy for Emerging Areas in Communications Networks (Los Alamitos, CA, USA), IEEE Computer Society, 2005, pp. 47-58
-
(2005)
International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 47-58
-
-
Kfir, Z.1
Wool, A.2
-
12
-
-
34548060449
-
Stochastic model checking
-
Springer
-
M. Kwiatkowska, G. Norman, and D. Parker, "Stochastic model checking," in Formal Methods for the Design of Computer, Communication and Software Systems: Performance Evaluation (SFM'07), LNCS (Tutorial Volume), pp. 220-270, Springer, 2007
-
(2007)
Formal Methods for the Design of Computer, Communication and Software Systems: Performance Evaluation (SFM'07), LNCS (Tutorial Volume)
, pp. 220-270
-
-
Kwiatkowska, M.1
Norman, G.2
Parker, D.3
-
13
-
-
84949526458
-
-
www.iso. org/iso/home/store/catalogue-ics/catalogue-detail-ics. htm?csnumber=43458
-
-
-
-
14
-
-
85066944987
-
Keep your enemies close: Distance bounding against smartcard relay attacks
-
Boston, MA), USENIX Association
-
Saar Drimer and Steven J. Murdoch, Keep your enemies close: distance bounding against smartcard relay attacks, Proceedings of 16th USENIX Security Symposium (Boston, MA), USENIX Association, 2007, pp. 1-16
-
(2007)
Proceedings of 16th USENIX Security Symposium
, pp. 1-16
-
-
Drimer, S.1
Murdoch, S.J.2
-
15
-
-
33751067978
-
Practical attacks on proximity identification systems (short paper)
-
Oakland, CA), IEEE Computer Society
-
Gerhard P. Hancke, Practical attacks on proximity identification systems (short paper), SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (Oakland, CA), IEEE Computer Society, 2006, pp. 328-333
-
(2006)
SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 328-333
-
-
Gerhard, P.1
Hancke2
-
16
-
-
79960351824
-
PRISM 4. 0: Verification of probabilistic real-time systems
-
G. Gopalakrishnan and S. Qadeer, eds.)of LNCS, Springer
-
M. Kwiatkowska, G. Norman, and D. Parker, "PRISM 4. 0: Verification of probabilistic real-time systems," in Proc. 23rd International Conference on Computer Aided Verification (CAV'11) (G. Gopalakrishnan and S. Qadeer, eds.), vol. 6806 of LNCS, pp. 585-591, Springer, 2011.
-
(2011)
Proc. 23rd International Conference on Computer Aided Verification (CAV'11)
, vol.6806
, pp. 585-591
-
-
Kwiatkowska, M.1
Norman, G.2
Parker, D.3
|