-
1
-
-
85016018427
-
Design and implementation of an encryption algorithm for use in RFID system
-
M. Abdelhalim, M. El-Mahallawy, M. Ayyad, and A. Elhennawy. Design and Implementation of an Encryption Algorithm for use in RFID System. International Journal of RFID Security and Cryptography, 1(1), 2012.
-
(2012)
International Journal of RFID Security and Cryptography
, vol.1
, pp. 1
-
-
Abdelhalim, M.1
El-Mahallawy, M.2
Ayyad, M.3
Elhennawy, A.4
-
4
-
-
84883296685
-
-
Alien Technology Inc
-
Alien Technology Inc. ALN-9640 Squiggle Inlay. www.alientechnology.com.
-
ALN-9640 Squiggle Inlay
-
-
-
5
-
-
0035509924
-
Sum of gamma variates and performance of wireless communication systems over nakagami-fading channels
-
M.-S. Alouini, A. Abdi, and M. Kaveh. Sum of Gamma Variates and Performance of Wireless Communication Systems Over Nakagami-Fading Channels. IEEE Transactions on Vehicular Technology, 50(6), 2001.
-
(2001)
IEEE Transactions on Vehicular Technology
, vol.50
, pp. 6
-
-
Alouini, M.-S.1
Abdi, A.2
Kaveh, M.3
-
9
-
-
34547688845
-
Public-key cryptography for RFID-tags
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede. Public-Key Cryptography for RFID-Tags. In IEEE International Conference on Pervasive Computing and Communications Workshops, 2007.
-
(2007)
IEEE International Conference on Pervasive Computing and Communications Workshops
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
10
-
-
84877887414
-
Security analysis of a cryptographically enabled RFID device
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo. Security analysis of a cryptographically enabled rfid device. In USENIX Security Symposium, 2005.
-
(2005)
USENIX Security Symposium
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
17
-
-
84966759264
-
-
DLP Design, Inc.
-
DLP Design, Inc. DLP-RFID-ANT.
-
DLP-RFID-ANT
-
-
-
20
-
-
84871575556
-
-
Eval-ADG-904R
-
Eval-ADG-904R. Analog Devices.
-
Analog Devices
-
-
-
22
-
-
84953884552
-
Dismantling MIFARE classic
-
F. Garcia, G. Gans, R. Muijrers, P. Rossum, R. Verdult, R. Schreur, and B. Jacobs. Dismantling MIFARE classic. ESORICS, 2008.
-
(2008)
ESORICS
-
-
Garcia, F.1
Gans, G.2
Muijrers, R.3
Rossum, P.4
Verdult, R.5
Schreur, R.6
Jacobs, B.7
-
25
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: non-invasive security for implantable medical devices. In ACM SIGCOMM, 2011.
-
(2011)
ACM SIGCOMM
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
26
-
-
84887955900
-
An integrated framework for obstacle mapping with see-through capabilities using laser and wireless channel measurements
-
A. Gonzalez-Ruiz, A. Ghaffarkhah, and Y. Mostofi. An Integrated Framework for Obstacle Mapping with See-Through Capabilities using Laser and Wireless Channel Measurements. IEEE Sensors Journal, 14(1), 2014.
-
(2014)
IEEE Sensors Journal
, vol.14
, pp. 1
-
-
Gonzalez-Ruiz, A.1
Ghaffarkhah, A.2
Mostofi, Y.3
-
27
-
-
84881158363
-
EnGarde: Protecting the mobile phone from malicious NFC interactions
-
J. Gummeson, B. Priyantha, D. Ganesan, D. Thrasher, and P. Zhang. EnGarde: Protecting the mobile phone from malicious NFC interactions. In MobiSys, 2013.
-
(2013)
MobiSys
-
-
Gummeson, J.1
Priyantha, B.2
Ganesan, D.3
Thrasher, D.4
Zhang, P.5
-
29
-
-
84967000745
-
Security in near field communication (nfc)
-
E. Haselsteiner and K. Breitfu. Security in near field communication (nfc). In EURASIP, 2008.
-
(2008)
EURASIP
-
-
Haselsteiner, E.1
Breitfu, K.2
-
31
-
-
80054735105
-
Rf directional modulation technique using a switched antenna array for physical layer secure communication applications
-
T. Hong, M. Song, and Y. Liu. Rf directional modulation technique using a switched antenna array for physical layer secure communication applications. Progress in Electromagnetics Research, 166, 2011.
-
(2011)
Progress in Electromagnetics Research
, vol.166
-
-
Hong, T.1
Song, M.2
Liu, Y.3
-
33
-
-
77950672398
-
Transmit/receive isolator for UHF RFID reader with wideband balanced directional coupler
-
H.-S. Jang, W.-G. Lim, and J.-W. Yu. Transmit/receive isolator for UHF RFID reader with wideband balanced directional coupler. In IEEE Microware Conference, 2009.
-
(2009)
IEEE Microware Conference
-
-
Jang, H.-S.1
Lim, W.-G.2
Yu, J.-W.3
-
34
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
A. Juels, R. L. Rivest, and M. Szydlo. The blocker tag: selective blocking of rfid tags for consumer privacy. CCS'03.
-
CCS'03
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
35
-
-
54049107792
-
A universally optimum decoder for multiplicative audio watermarking
-
N. K. Kalantari, S. M. A. Ahadi, and H. Amindavar. A universally optimum decoder for multiplicative audio watermarking. In ICME, 2008.
-
(2008)
ICME
-
-
Kalantari, N.K.1
Ahadi, S.M.A.2
Amindavar, H.3
-
36
-
-
77953802876
-
Secure transmission with multiple antennas: Part II: The MIMOME wiretap channel
-
A. Khisti and G. Wornell. Secure transmission with multiple antennas: part II: the MIMOME wiretap channel. IEEE Transactions on Information Theory, 2010.
-
(2010)
IEEE Transactions on Information Theory
-
-
Khisti, A.1
Wornell, G.2
-
38
-
-
84905386372
-
-
CCS
-
K. Koscher, A. Juels, V. Brajkovic, and T. Kohno. EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond. CCS, 2009.
-
(2009)
EPC RFID Tag Security Weaknesses and Defenses: Passport Cards Enhanced Drivers Licenses and beyond
-
-
Koscher, K.1
Juels, A.2
Brajkovic, V.3
Kohno, T.4
-
41
-
-
79957492153
-
Bandwidth dependence of CW ranging to UHF RFID tags in severe multipath environments
-
G. Li, D. Arnitx, R. Ebelt, U. Muehlmann, K. Witrisal, and M. Vossiek. Bandwidth Dependence of CW Ranging to UHF RFID Tags in Severe Multipath Environments. In IEEE Conference on RFID 2011.
-
(2011)
IEEE Conference on RFID
-
-
Li, G.1
Arnitx, D.2
Ebelt, R.3
Muehlmann, U.4
Witrisal, K.5
Vossiek, M.6
-
42
-
-
51849132358
-
Using antenna array redundancy and channel diversity for secure wireless transmissions
-
X. Li, J. Hwu, and E. P. Ratazzi. Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions. Journal of Communications, 2(3), 2007.
-
(2007)
Journal of Communications
, vol.2
, pp. 3
-
-
Li, X.1
Hwu, J.2
Ratazzi, E.P.3
-
43
-
-
84967128731
-
RFID reader detector and tilt-sensitive RFID tag
-
N. Marquardt and A. Taylor. RFID Reader Detector and Tilt-Sensitive RFID Tag. In ACM CHI 2009, 2009.
-
(2009)
ACM CHI 2009
-
-
Marquardt, N.1
Taylor, A.2
-
45
-
-
84967200725
-
-
MasterCard Worldwide
-
MasterCard Worldwide. PayPass. www.paypass.com.
-
PayPass
-
-
-
51
-
-
81755171098
-
-
NXP Semiconductors
-
NXP Semiconductors. MIFARE Classic. http://mifere.net/overview/mifare-standards/.
-
MIFARE Classic
-
-
-
56
-
-
70349278937
-
Effect of gen2 protocol parameters on rfid tag performance
-
P.Nikitin et al. Effect of gen2 protocol parameters on rfid tag performance. In IEEE RFID, 2009.
-
(2009)
IEEE RFID
-
-
Nikitin, P.1
-
60
-
-
84967122378
-
Rfid noisy reader how to prevent from eavesdropping on the communication?
-
O. Savry, F. Peyroula, F. Dehmas, G. Robert, and J. Reverdy. Rfid noisy reader how to prevent from eavesdropping on the communication? CHES, 2007.
-
(2007)
CHES
-
-
Savry, O.1
Peyroula, F.2
Dehmas, F.3
Robert, G.4
Reverdy, J.5
-
62
-
-
84881223293
-
Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity
-
Oakland
-
W. Shen, P. Ning, X. He, and H. Dai. Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity. In IEEE Symposium on Security and Privacy, Oakland, 2013.
-
(2013)
IEEE Symposium on Security and Privacy
-
-
Shen, W.1
Ning, P.2
He, X.3
Dai, H.4
-
64
-
-
84967117852
-
-
Travelon, Inc.
-
Travelon, Inc. RFID Blocking. www.travelonbags.com.
-
RFID Blocking
-
-
-
68
-
-
84887063334
-
RF-compass: Robot object manipulation using RFIDs
-
J. Wang, F. Adib, R. Knepper, D. Katabi, and D. Rus. RF-compass: Robot Object Manipulation Using RFIDs. In ACM MOBICOM, 2013.
-
(2013)
ACM MOBICOM
-
-
Wang, J.1
Adib, F.2
Knepper, R.3
Katabi, D.4
Rus, D.5
-
69
-
-
84883286297
-
Dude, where's my card?: RFID positioning that works with multipath and non-line of sight
-
J. Wang and D. Katabi. Dude, Where's My Card?: RFID Positioning That Works with Multipath and Non-line of Sight. In ACM SIGCOMM, 2013.
-
(2013)
ACM SIGCOMM
-
-
Wang, J.1
Katabi, D.2
-
70
-
-
84903125854
-
NShield: A noninvasive NFC security system for mobile devices
-
R. Zhou and G. Xing. nShield: A Noninvasive NFC Security System for Mobile Devices. In MobiSys, 2014.
-
(2014)
MobiSys
-
-
Zhou, R.1
Xing, G.2
-
72
-
-
84967038572
-
-
Zipcar Inc
-
Zipcar, Inc. www.zipcar.com/how/technology.
-
-
-
|