-
2
-
-
33744957484
-
Adversarial model for radio frequency identification
-
Report 2005/049
-
G.Avoine, “Adversarial model for radio frequency identification,” Cryptology ePrint Archive, Report 2005/049, 2005.
-
(2005)
Cryptology Eprint Archive
-
-
Avoine, G.1
-
3
-
-
85025631836
-
Security and privacy in RFID systems
-
LastAccess: May
-
G.Avoine, Security and privacy in RFID systems (A complete list of related papers), http://lasecwww.epfl.ch/gavoine/rfid/, LastAccess: May 2006.
-
(2006)
A Complete List of Related Papers
-
-
Avoine, G.1
-
4
-
-
33745621564
-
Reducing time complexity in RFID systems
-
Springer-Verlag
-
G.Avoine, E.Dysli, and P.Oechslin, “Reducing time complexity in RFID systems,”Selected Areas in Cryptography - SAC 2005, LNCS 3897, Springer-Verlag, pp.291-306, 2005.
-
(2005)
Selected Areas in Cryptography - SAC 2005, LNCS 3897
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
5
-
-
26444478592
-
RFID traceability: A multilayer problem
-
Springer-Verlag
-
G.Avoine and P.Oechslin, “RFID traceability: A multilayer problem,”Financial Cryptography - FC 2005, LNCS 3570, Springer-Verlag, pp.125-140, 2005.
-
(2005)
Financial Cryptography - FC 2005, LNCS 3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
7
-
-
85025605773
-
-
Boycott Benetton Home Page, http://www.boycottbenetton.com/, 2003.
-
(2003)
-
-
-
8
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloningattacks
-
T.Dimitriou, “A lightweight RFID protocol to protect against traceability and cloningattacks,” InIEEESecureComm, pp.59-66, 2005.
-
(2005)
Inieeesecurecomm, Pp
, pp. 59-66
-
-
Dimitriou, T.1
-
9
-
-
85025658100
-
-
EPCglobal Web site, http://www.EPCglobalinc.org, 2005.
-
(2005)
-
-
-
10
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
M.Feldhofer, S.Dominikus, and J.Wolkerstorfer, “Strong authentication for RFID systems using the AES algorithm,”Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, LNCS 3156, Springer-Verlag, pp.357-370, 2004.
-
(2004)
Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, LNCS 3156, Springer-Verlag
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
12
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers,”
-
D.Henrici and P.Müller, “Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers,” Workshop on Pervasive Computing and Communications Security - PerSec 2004, IEEE ComputerSociety, pp.149-153, 2004.
-
(2004)
Workshop on Pervasive Computing and Communications Security - Persec 2004, IEEE Computersociety
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
13
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
A.Juels, “Minimalist cryptography for low-cost RFID tags,”The Fourth International Conference on Security in Communication Networks - SCN 2004, LNCS 3352, Springer-Verlag, pp.149-164, 2004.
-
(2004)
The Fourth International Conference on Security in Communication Networks - SCN 2004, LNCS 3352, Springer-Verlag
, pp. 149-164
-
-
Juels, A.1
-
15
-
-
20844459862
-
RFID privacy: An overview of problems andproposedsolutions
-
A.Juels, S.Garfinkel, and R.Pappu, “RFID privacy: An overview of problems andproposedsolutions,” IEEE Security and Privacy, 3(3):34- 43, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
-
-
Juels, A.1
Garfinkel, S.2
Pappu, R.3
-
16
-
-
62349137009
-
Security and privacy issues in e-passports
-
Referenced 2005
-
A. Juels, D. Molnar, and D. Wagner, “Security and privacy issues in e-passports,” IEEE SecureComm’05, IEEE, 2005, Referenced 2005 at http://www.cs.berkeley.edu/ dmolnar/papers/papers.html.
-
(2005)
IEEE SecureComm’05, IEEE
-
-
Juels, A.1
Molnar, D.2
Wagner, D.3
-
17
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
A. Juels, R.L. Rivest, and M. Szydlo, “The blocker tag: Selective blocking of RFID tags for consumer privacy,” 8th ACM Conference on Computer and Communications Security, ACM Press, pp.103-111, 2003.
-
(2003)
8Th ACM Conference on Computer and Communications Security, ACM Press
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
18
-
-
33746092119
-
High-power proxies for enhancing RFID privacy and utility
-
A.Juels, P.Syverson and D.Bailey, High-power proxies for enhancing RFID privacy and utility, In Privacy Enhancing Technology 2005, LNCS 3856, Spinger-Verlag, 2005, pp.210-226.
-
(2005)
Privacy Enhancing Technology 2005, LNCS 3856, Spinger-Verlag
, pp. 210-226
-
-
Juels, A.1
Syverson, P.2
Bailey, D.3
-
19
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
A.Juels and S.Weis, Authenticating pervasive devices with human protocols, In Advances in Cryptology-Crypto 2005, LNCS 3621, Spinger-Verlag, 2005, pp.293-308.
-
(2005)
Advances in Cryptology-Crypto 2005, LNCS 3621, Spinger-Verlag
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
20
-
-
33744929155
-
MCrypton-A lightweight block cipher for security of low-cost RFID tags and sensors
-
C.H.Lim and T.Korkishko, mCrypton-A lightweight block cipher for security of low-cost RFID tags and sensors, In WISA 2005, LNCS 3786, Spinger-Verlag, 2006, pp.243-258.
-
(2006)
WISA 2005, LNCS 3786, Spinger-Verlag
, pp. 243-258
-
-
Lim, C.H.1
Korkishko, T.2
-
21
-
-
24944582157
-
Efficient authentication for low-cost RFID systems
-
S.Lee, Y.Hwang, D.Lee, and J.Lim, “Efficient authentication for low-cost RFID systems,”Computing System Applications, LNCS 3480, Springer-Verlag, pp.619-627, 2005.
-
(2005)
Computing System Applications, LNCS 3480, Springer-Verlag
, pp. 619-627
-
-
Lee, S.1
Hwang, Y.2
Lee, D.3
Lim, J.4
-
22
-
-
35048851224
-
The hierarchy of key evolving Signatures and a characterization of proxy signatures
-
Springer-Verlag
-
T. Malkin, S. Obana and M. Yung, The hierarchy of key evolving Signatures and a characterization of proxy signatures, In Advances in Cryptology-EUROCRYPT 2004, LNCS 3027, pp.306-322. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology-Eurocrypt 2004, LNCS 3027
, pp. 306-322
-
-
Malkin, T.1
Obana, S.2
Yung, M.3
-
23
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
-
D.Molnar, A.Soppera, and D.Wagner, “A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags,”Selected Areas in Cryptography -SAC 2005, LNCS 3897, Springer-Verlag, pp.276-290, 2005.
-
(2005)
Selected Areas in Cryptography -SAC 2005, LNCS 3897, Springer-Verlag
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
24
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
D.Molnar and D.Wagner, “Privacy and security in library RFID: Issues, practices, and architectures,” ACM Conference on Communications and Computer Security, ACM Press, pp.210-219, 2004.
-
(2004)
ACM Conference on Communications and Computer Security, ACM Press
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
26
-
-
26444435642
-
RFID guardian: A battery-powered mobile device for RFID privacy management
-
Springer-Verlag
-
M. Rieback, B. Crispo and A. Tanenbaum, RFID guardian: A battery-powered mobile device for RFID privacy management, In ACISP 2005, LNCS 3574, Springer-Verlag, pp.184-194, 2005.
-
(2005)
ACISP 2005, LNCS 3574
, pp. 184-194
-
-
Rieback, M.1
Crispo, B.2
Tanenbaum, A.3
-
27
-
-
35248872610
-
RFID systems and security and privacy implications
-
S.Sarma, S.Weis, and D.Engels, “RFID systems and security and privacy implications,”Workshop on Cryptographic Hardware and Embedded System - CHES 2002, LNCS 2523, Springer-Verlag, pp.454-469, 2002.
-
(2002)
Workshop on Cryptographic Hardware and Embedded System - CHES 2002, LNCS 2523, Springer-Verlag
, pp. 454-469
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
28
-
-
0742292799
-
Internet Security Glossary
-
May 2000
-
R. Shirey, “Internet Security Glossary,” IETF RFC 2828, at http://www.ietf.org/rfc/rfc2828.txt, May 2000.
-
IETF RFC 2828
-
-
Shirey, R.1
-
29
-
-
85025694163
-
-
Stop RFID, http://www.stoprfid.org.
-
-
-
-
30
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S.Weis, S.Sarma, R.Rivest, and D.Engels, “Security and privacy aspects of low-cost radio frequency identification systems,”International Conf. on Security in Pervasive Computing - SPC 2003, LNCS 2802, Springer-Verlag, pp.454-469, 2003.
-
(2003)
International Conf. on Security in Pervasive Computing - SPC 2003, LNCS 2802, Springer-Verlag
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|