-
1
-
-
80051969734
-
A robust and secure RFID-based pedigree system (short paper)
-
C. C. Tan and Q. Li, “A robust and secure RFID-based pedigree system (short paper),” in ICICS, 2006
-
(2006)
ICICS
-
-
Tan, C.C.1
Li, Q.2
-
2
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
T. Dimitriou, “A lightweight RFID protocol to protect against traceability and cloning attacks,” in SecureComm, 2005
-
(2005)
SecureComm
-
-
Dimitriou, T.1
-
5
-
-
33750290259
-
YA-TRAP: Yet another trivial RFID authentication protocol
-
G. Tsudik, “YA-TRAP: Yet another trivial RFID authentication protocol,” in PerCom 2006
-
(2006)
PerCom
-
-
Tsudik, G.1
-
6
-
-
33845386166
-
Lightweight authentication protocols for low-cost RFID tags
-
I. Vajda and L. Buttyan, “Lightweight authentication protocols for low-cost RFID tags,” in Ubicomp 2003
-
(2003)
Ubicomp
-
-
Vajda, I.1
Buttyan, L.2
-
7
-
-
85008044037
-
-
G. Avoine, “http://lasecwww.epfl.ch/gavoine/rfid/.”
-
-
-
Avoine, G.1
-
8
-
-
30344451754
-
RFID security and privacy: A research survey
-
A. Juels, “RFID security and privacy: A research survey,” Manuscript, 2005
-
(2005)
Manuscript
-
-
Juels, A.1
-
10
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S. Weis, S. Sarma, R. Rivest, and D. Engels, “Security and privacy aspects of low-cost radio frequency identification systems,” in SPC 2003
-
(2003)
SPC
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
11
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
D. Molnar and D. Wagner, “Privacy and security in library RFID: Issues, practices, and architectures,” in CCS, 2004
-
(2004)
CCS
-
-
Molnar, D.1
Wagner, D.2
-
12
-
-
57849147967
-
Security analysis of two ultra-lightweight RFID authentication protocols
-
T. Li and G. Wang, “Security analysis of two ultra-lightweight RFID authentication protocols,” in IFIP SEC 2007
-
(2007)
IFIP SEC
-
-
Li, T.1
Wang, G.2
-
13
-
-
34548162681
-
Vulnerability analysis of EMAP - an efficient RFID mutual authentication protocol
-
T. Li and R. H. Deng, “Vulnerability analysis of EMAP - an efficient RFID mutual authentication protocol,” in AReS 2007
-
(2007)
AReS
-
-
Li, T.1
Deng, R.H.2
-
14
-
-
17144430885
-
Security analysis and enhancements of 3GPP authentication and key agreement protocol
-
M. Zhang and Y. Fang, “Security analysis and enhancements of 3GPP authentication and key agreement protocol,” IEEE Trans. Wireless Commun., 2005
-
(2005)
IEEE Trans. Wireless Commun
-
-
Zhang, M.1
Fang, Y.2
-
17
-
-
36249031858
-
HB and related lightweight authentication protocols for secure RFID tag/reader authentication
-
S. Piramuthu, “HB and related lightweight authentication protocols for secure RFID tag/reader authentication,” in CollECTeR 2006
-
(2006)
CollECTeR
-
-
Piramuthu, S.1
-
18
-
-
85008029405
-
An active attack against HB+ - a provably secure lightweight authentication protocol
-
H. Gilbert, M. Robshaw, and H. Sibert, “An active attack against HB+ - a provably secure lightweight authentication protocol,” Manuscript, 2005
-
(2005)
Manuscript
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
19
-
-
33845920117
-
HB++: a lightweight authentication protocol secure against some attacks
-
J. Bringer, H. Chabanne, and D. Emmanuelle, “HB++: a lightweight authentication protocol secure against some attacks,” in SecPerU 2006
-
(2006)
SecPerU
-
-
Bringer, J.1
Chabanne, H.2
Emmanuelle, D.3
-
20
-
-
34547630116
-
Secure anonymous RFID authentication protocols
-
C. Chatmon, T. van Le, and M. Burmester, “Secure anonymous RFID authentication protocols,” Florida State University, Department of Computer Science, Tech. Rep., 2006
-
(2006)
Florida State University, Department of Computer Science, Tech. Rep
-
-
Chatmon, C.1
van Le, T.2
Burmester, M.3
-
21
-
-
34548830043
-
A case against currently used hash functions in rfid protocols
-
” in
-
M. Feldhofer and C. Rechberger, “A case against currently used hash functions in rfid protocols.” in OTM Workshops (1), 2006
-
(2006)
OTM Workshops (1)
-
-
Feldhofer, M.1
Rechberger, C.2
-
22
-
-
77953307049
-
Physically unclonable function-based security and privacy in rfid systems
-
L. Bolotnyy and G. Robins, “Physically unclonable function-based security and privacy in rfid systems,” in PerCom 07
-
PerCom 07
-
-
Bolotnyy, L.1
Robins, G.2
-
23
-
-
84857614367
-
Public key cryptography for RFID-tags
-
RFIDSec 06
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, “Public key cryptography for RFID-tags,” RFIDSec 06
-
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
24
-
-
34548815120
-
Are standards compliant elliptic curve cryptosystems feasible on RFID?
-
” RFIDSec 06
-
S. Kumar and C. Paar, “Are standards compliant elliptic curve cryptosystems feasible on RFID?” RFIDSec 06
-
-
-
Kumar, S.1
Paar, C.2
-
25
-
-
35348832191
-
An elliptic curve processor suitable for RFID-tags
-
Cryptology ePrint Archive, Report /227
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, “An elliptic curve processor suitable for RFID-tags,” Cryptology ePrint Archive, Report 2006/227
-
(2006)
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
27
-
-
46849122785
-
Efficient implementation of public key cryptosystems on mote sensors (short paper)
-
H. Wang and Q. Li, “Efficient implementation of public key cryptosystems on mote sensors (short paper),” in ICICS 06
-
ICICS 06
-
-
Wang, H.1
Li, Q.2
-
28
-
-
85008052972
-
Distributed user access control in sensor networks
-
H. Wang and Q. Li, “Distributed user access control in sensor networks,” in DCOSS 06
-
DCOSS 06
-
-
Wang, H.1
Li, Q.2
-
29
-
-
85088055036
-
Strengthening EPC tags against cloning
-
A. Juels, “Strengthening EPC tags against cloning,” in WiSe'05
-
WiSe'05
-
-
Juels, A.1
-
30
-
-
34547617685
-
Mining compressed commodity workflows from massive rfid data sets
-
” in
-
H. Gonzalez, J. Han, and X. Li, “Mining compressed commodity workflows from massive rfid data sets.” in CIKM 2006
-
CIKM 2006
-
-
Gonzalez, H.1
Han, J.2
Li, X.3
-
32
-
-
2942524989
-
Squealing euros: Privacy protection in RFID-enabled banknotes
-
A. Juels and R. Pappu, “Squealing euros: Privacy protection in RFID-enabled banknotes,” in FC'03
-
FC'03
-
-
Juels, A.1
Pappu, R.2
|