-
1
-
-
33745797863
-
In Untraceable RFID Tags via Insubvertible Encryption
-
Alexandria, VA, USA, 7-11, (ACM Press, 2005)
-
G. Ateniese, J. Camenisch, B. de Medeiros, in Untraceable RFID Tags via Insubvertible Encryption. Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 7-11 Nov 2005 (ACM Press, 2005), pp. 92-101
-
(2005)
Proceedings of the 12Th ACM Conference on Computer and Communications Security
, pp. 92-101
-
-
Ateniese, G.1
Camenisch, J.2
De Medeiros, B.3
-
2
-
-
70349117963
-
-
Atmel Corporation. Innovative IDIC solutions. http://www.atmel.com/dyn/resources/prod_documents/doc4602.pdf, 2007
-
(2007)
Innovative IDIC Solutions
-
-
-
4
-
-
33745621564
-
Reducing Time Complexity in RFID systems
-
Kingston, ON, Canada, 11-12 Aug 2005. Lecture Notes in Computer Science, Springer, Berlin
-
G. Avoine, E. Dysli, P. Oechslin, in Reducing Time Complexity in RFID systems. 12th International Workshop on Selected Areas in Cryptography (SAC), Kingston, ON, Canada, 11-12 Aug 2005. Lecture Notes in Computer Science, vol. 3897 (Springer, Berlin, 2005), pp. 291-306
-
(2005)
12Th International Workshop on Selected Areas in Cryptography (SAC)
, vol.3897
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
5
-
-
78650333960
-
When Compromised Readers Meet RFID
-
Leuven, Belgium, 30 June-2 July
-
G. Avoine, C. Lauradoux, T. Martin in When Compromised Readers Meet RFID. The 5th Workshop on RFID Security 2009, Leuven, Belgium, 30 June-2 July, 2009
-
(2009)
The 5Th Workshop on RFID Security 2009
-
-
Avoine, G.1
Lauradoux, C.2
Martin, T.3
-
6
-
-
34547623904
-
Physically Unclonable Function-Based Security and Privacy in RFID systems
-
White Plains, NY, USA, 19-23 Mar 2007, IEEE Computer Society, Washington, DC
-
L. Bolotnyy, G. Robins, in Physically Unclonable Function-Based Security and Privacy in RFID systems. Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications, White Plains, NY, USA, 19-23 Mar 2007 (IEEE Computer Society, Washington, DC, 2007)
-
(2007)
Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
-
-
Bolotnyy, L.1
Robins, G.2
-
7
-
-
50049108255
-
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
-
Baltimore, MD, USA, 28 Aug-1 Sept 2006, IEEE Computer Society, Washington, DC
-
M. Burmester, T. van Le, B. de Medeiros, Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. Proceedings of Second International Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, MD, USA, 28 Aug-1 Sept 2006 (IEEE Computer Society, Washington, DC, 2006), pp. 1-9
-
(2006)
Proceedings of Second International Conference on Security and Privacy in Communication Networks (Securecomm)
, pp. 1-9
-
-
Burmester, M.1
Van Le, T.2
De Medeiros, B.3
-
9
-
-
77049116572
-
In Revisiting DoS Attacks and Privacy in RFID-Enabled Networks
-
Rhodes, Greece, 10-11 July 2009. Lecture Notes in Computer Science, Springer, July
-
P. D’Arco, A. Scafuro, I. Visconti, in Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. Proceedings of ALGOSENSORS, Rhodes, Greece, 10-11 July 2009. Lecture Notes in Computer Science (Springer, July 2009)
-
(2009)
Proceedings of ALGOSENSORS
-
-
D’Arco, P.1
Scafuro, A.2
Visconti, I.3
-
10
-
-
71549150422
-
Semi-Destructive Privacy in DoS-Enabled RFID Systems
-
Leuven, Belgium, 30 June-2 July 2009
-
P. D’Arco, A. Scafuro, I. Visconti, in Semi-Destructive Privacy in DoS-Enabled RFID Systems. Proceedings of RFIDSec, Leuven, Belgium, 30 June-2 July 2009, July 2009
-
(2009)
Proceedings of Rfidsec
-
-
D’Arco, P.1
Scafuro, A.2
Visconti, I.3
-
11
-
-
49049105769
-
Design and Implementation of PUF-Based Unclonable RFID ICs for Anti-counterfeiting and Security Applications
-
Las Vegas, NV, USA, 16-17 April, (IEEE Computer Society, 2008)
-
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal, in Design and Implementation of PUF-Based Unclonable RFID ICs for Anti-counterfeiting and Security Applications. IEEE International Conference on RFID 2008, Las Vegas, NV, USA, 16-17 April, 2008 (IEEE Computer Society, 2008), pp. 58-64
-
(2008)
IEEE International Conference on RFID 2008
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
12
-
-
33847330246
-
In A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks
-
Greece, 5-9 Sept, (IEEE Computer Society, 2005)
-
T. Dimitriou, in A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks. Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm) Athens, Greece, 5-9 Sept 2005 (IEEE Computer Society, 2005), pp. 59-66
-
(2005)
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (Securecomm) Athens
, pp. 59-66
-
-
Dimitriou, T.1
-
13
-
-
35048865463
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Switzerland, 2-6 May, 2004, Proceedings. Lecture Notes in Computer Science
-
Y. Dodis, L. Reyzin, A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2-6 May, 2004, Proceedings. Lecture Notes in Computer Science, vol. 3027 (Springer, 2004), pp. 523-540
-
(2004)
International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
14
-
-
84873433835
-
-
chapter Fuzzy Extractors, Springer
-
Y. Dodis, L. Reyzin, A. Smith, in Security with Noisy Data, chapter Fuzzy Extractors, (Springer, 2007), pp. 79-99
-
(2007)
Security with Noisy Data
, pp. 79-99
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
16
-
-
85019703744
-
-
Web site of EPCglobal Inc
-
EPCglobal Inc. Web site of EPCglobal Inc http://www.epcglobalinc.org/, April 2008
-
(2008)
-
-
-
17
-
-
85019722663
-
RFID-Handbook 2nd edn
-
Carl Hanser Verlag, Munich, Germany, Apr, Swadlincote, UK
-
K. Finkenzeller, RFID-Handbook 2nd edn. (Carl Hanser Verlag, Munich, Germany, Apr 2003). Translated from the 3rd German edition by Rachel Waddington, Swadlincote, UK
-
(2003)
Translated from the 3Rd German Edition by Rachel Waddington
-
-
Finkenzeller, K.1
-
19
-
-
46449138830
-
In Controlled Physical Random Functions
-
Las Vegas, NV, USA, 9-13, (IEEE Computer Society, 2002)
-
B. Gassend, D. Clarke, M. van Dijk, S. Devadas, in Controlled Physical Random Functions. Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, NV, USA, 9-13 Dec 2002 (IEEE Computer Society, 2002), pp. 149-160
-
(2002)
Proceedings of the 18Th Annual Computer Security Applications Conference
, pp. 149-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
21
-
-
54249085502
-
Good Variants of HB+ Are Hard to Find. InG. Tsudik. Financial Cryptography and Data Security
-
Cozumel, Mexico, 28-31 Jan 2008, Revised Selected Papers. Lecture Notes in Computer Science, (Springer
-
H. Gilbert, M.J.B. Robshaw, Y. Seurin, in Good Variants of HB+ Are Hard to Find. inG. Tsudik. Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, 28-31 Jan 2008, Revised Selected Papers. Lecture Notes in Computer Science, (Springer, 2008), pp. 156-170
-
(2008)
12Th International Conference, FC 2008
, pp. 156-170
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
22
-
-
35048899238
-
In Universal Re-encryption for Mixnets. The Cryptographers’ Track at the RSA Conference
-
San Francisco, CA, USA, 23-27 Feb, (Springer, 2004)
-
P. Golle, M. Jakobsson, A. Juels, P. Syverson, in Universal Re-encryption for Mixnets. The Cryptographers’ Track at the RSA Conference 2004, Proceedings. Lecture Notes in Computer Science, San Francisco, CA, USA, 23-27 Feb 2004 (Springer, 2004), pp. 163-178.
-
(2004)
Proceedings. Lecture Notes in Computer Science
, pp. 163-178
-
-
Golle, P.1
Jakobsson, M.2
Juels, A.3
Syverson, P.4
-
23
-
-
57049137188
-
A new formal proof model for RFID location privacy
-
J.H. Ha, S.J. Moon, J. Zhou, J.C. Ha, A new formal proof model for RFID location privacy. In Jajodia and Lopez [28], pp. 267-281
-
In Jajodia and Lopez
, Issue.28
, pp. 267-281
-
-
Ha, J.H.1
Moon, S.J.2
Zhou, J.3
Ha, J.C.4
-
24
-
-
2942625823
-
In Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers
-
Orlando, FL, USA, 14-17, (IEEE Computer Society, 2004)
-
D. Henrici, P. Müller, in Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Orlando, FL, USA, 14-17 Mar 2004 (IEEE Computer Society, 2004), pp. 149-153
-
(2004)
Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
25
-
-
50249134033
-
Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags
-
Malaga, Spain, 11-13 July
-
D.E. Holcomb, W.P. Burleson, K. Fu, Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags. Conference on RFID Security 2007, Malaga, Spain, 11-13 July 2007
-
(2007)
Conference on RFID Security 2007
-
-
Holcomb, D.E.1
Burleson, W.P.2
Fu, K.3
-
26
-
-
51049096802
-
RFID and Its Vulnerability to Faults
-
Washington, DC, USA, 10-13, Proceedings. Lecture Notes in Computer Science, (Springer, 2008)
-
M. Hutter, J.-M. Schmidt, T. Plos, RFID and Its Vulnerability to Faults. 10th International Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2008, Washington, DC, USA, 10-13 Aug 2008, Proceedings. Lecture Notes in Computer Science, vol. 5154 (Springer, 2008), pp. 363-379
-
(2008)
10Th International Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2008
, vol.5154
, pp. 363-379
-
-
Hutter, M.1
Schmidt, J.-M.2
Plos, T.3
-
27
-
-
85019707972
-
Machine Readable Travel Documents, Doc 9303
-
I.C.A. Organization. Machine Readable Travel Documents, Doc 9303, Part 1 Machine Readable Passports, 5th edn., 2003
-
(2003)
Part 1 Machine Readable Passports, 5Th Edn.
-
-
-
28
-
-
85019685347
-
-
(eds.), Lecture Notes in Computer Science, Malaga, Spain, 6-8 Oct 2008, Springer
-
S. Jajodia, J. Lopez (eds.), Computer Security - ESORICS 2008. Lecture Notes in Computer Science, Malaga, Spain, 6-8 Oct 2008, vol. 5283 (Springer, 2008)
-
(2008)
Computer Security - ESORICS 2008
, vol.5283
-
-
Jajodia, S.1
Lopez, J.2
-
29
-
-
23944476196
-
Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract)
-
Revised Selected Papers. Lecture Notes in Computer Science, Amalfi, Italy, 8-10 Sep 2004, Springer
-
A. Juels, in Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract). 4th International Conference on Security in Communication Networks (SCN) 2004, Revised Selected Papers. Lecture Notes in Computer Science, Amalfi, Italy, 8-10 Sep 2004, vol. 3352 (Springer, 2004), pp. 149-164
-
(2004)
4Th International Conference on Security in Communication Networks (SCN) 2004
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
30
-
-
33144457479
-
RFID Security and Privacy: A Research Survey
-
A. Juels, in RFID Security and Privacy: A Research Survey. J. Select. Areas Commun. 24(2), 381-395 (Feb 2006)
-
(2006)
J. Select. Areas Commun
, vol.24
, Issue.2
, pp. 381-395
-
-
Juels, A.1
-
31
-
-
35248832722
-
In Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
-
Revised Papers. Lecture Notes in Computer Science, Gosier, Guadeloupe, FWI, 27-30, (Springer, 2003)
-
A. Juels, R. Pappu, in Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. 7th International Conference on Financial Cryptography (FC) 2003, Revised Papers. Lecture Notes in Computer Science, Gosier, Guadeloupe, FWI, 27-30 Jan 2003, vol. 2742 (Springer, 2003), pp. 103-121
-
(2003)
7Th International Conference on Financial Cryptography (FC) 2003
, vol.2742
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
32
-
-
33745181952
-
Authenticating pervasive devices with human protocols. In Advances in Cryptology - CRYPTO 2005
-
ed. by V. Shoup, Santa Barbara, CA, USA, 14-18 Aug 2005, Proceedings. Lecture Notes in Computer Science, Springer
-
A. Juels, S.A. Weis, Authenticating pervasive devices with human protocols. in Advances in Cryptology - CRYPTO 2005, ed. by V. Shoup. 25th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14-18 Aug 2005, Proceedings. Lecture Notes in Computer Science, vol. 3621 (Springer, 2005), pp. 293-308
-
(2005)
25Th Annual International Cryptology Conference
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
34
-
-
38149003666
-
Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise
-
in S.D. Galbraith, Cirencester, UK, 18-20, Proceedings. Lecture Notes in Computer Science, (Springer, 2007)
-
J. Katz, in Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise. in S.D. Galbraith. Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, 18-20 Dec 2007, Proceedings. Lecture Notes in Computer Science, vol. 4887 (Springer, 2007), pp. 1-15
-
(2007)
Cryptography and Coding, 11Th IMA International Conference
, vol.4887
, pp. 1-15
-
-
Katz, J.1
-
35
-
-
33746104831
-
Parallel and concurrent security of the HB and HB+ protocols. In Advances in Cryptology — EUROCRYPT 2006
-
ed. by S. Vaudenay, St. Petersburg, Russia, 28 May -1 June 2006, Proceedings. Lecture Notes in Computer Science, Springer
-
J. Katz, J.S. Shin, Parallel and concurrent security of the HB and HB+ protocols. in Advances in Cryptology — EUROCRYPT 2006, ed. by S. Vaudenay. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, 28 May -1 June 2006, Proceedings. Lecture Notes in Computer Science, vol. 4004 (Springer, 2006), pp. 73-87
-
(2006)
24Th Annual International Conference on the Theory and Applications of Cryptographic Techniques
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.S.2
-
39
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Santa Barbara, CA, USA, Proceedings, 18-22, (Springer, 1996)
-
P.C. Kocher, in Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. 16th Annual International Cryptology Conference, Santa Barbara, CA, USA, Proceedings, 18-22 Aug 1996. Lecture Notes in Computer Science, vol. 1109 (Springer, 1996), pp. 104-113
-
(1996)
16Th Annual International Cryptology Conference
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
40
-
-
84977783611
-
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
-
Raleigh, NC, USA, 4-7, Lecture Notes in Computer Science, (Springer, 2006)
-
C.H. Lim, T. Kwon, in Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. 8th International Conference on Information and Communications Security (ICICS), Raleigh, NC, USA, 4-7 Dec 2006. Lecture Notes in Computer Science, vol. 4307 (Springer, 2006), pp. 1-20
-
(2006)
8Th International Conference on Information and Communications Security (ICICS)
, vol.4307
, pp. 1-20
-
-
Lim, C.H.1
Kwon, T.2
-
42
-
-
14844294769
-
In Privacy and Security in Library RFID: Issues, Practices, and Architectures
-
Washington, DC, USA, 25-29, (ACM Press, 2004)
-
D. Molnar, D. Wagner, in Privacy and Security in Library RFID: Issues, Practices, and Architectures. Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, 25-29 Oct 2004 (ACM Press, 2004), pp. 210-219
-
(2004)
Proceedings of the 11Th ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
43
-
-
84948152556
-
In Memories: A Survey of Their Secure Uses in Smart Cards
-
Washington, DC, USA, 31, (IEEE Computer Society, 2003)
-
M. Neve, E. Peeters, D. Samyde, J.-J. Quisquater, in Memories: A Survey of Their Secure Uses in Smart Cards. Proceedings of the Second IEEE International Security in StorageWorkshop, Washington, DC, USA, 31 Oct 2003 (IEEE Computer Society, 2003), pp. 62-72
-
(2003)
Proceedings of the Second IEEE International Security in Storageworkshop
, pp. 62-72
-
-
Neve, M.1
Peeters, E.2
Samyde, D.3
Quisquater, J.-J.4
-
44
-
-
70350383766
-
In New Privacy Results on Synchronized RFID Authentication Protocols Against Tag Tracing
-
France, 21-25, Lecture Notes in Computer Science, (Springer, 2009)
-
C.Y. Ng, W. Susilo, Y. Mu, R. Safavi-Naini, in New Privacy Results on Synchronized RFID Authentication Protocols Against Tag Tracing. Proceedings of ESORICS, Saint Malo, France, 21-25 Sept 2009. Lecture Notes in Computer Science, vol. 5789 (Springer, 2009), pp. 321-336
-
(2009)
Proceedings of ESORICS, Saint Malo
, vol.5789
, pp. 321-336
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
45
-
-
85019744660
-
RFID privacy models revisited
-
C.Y. Ng, W. Susilo, Y. Mu, R. Safavi-Naini, RFID privacy models revisited. In Jajodia and Lopez [28], pp. 251-256
-
In Jajodia and Lopez
, vol.28
, pp. 251-256
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
47
-
-
71549116235
-
-
NXP Semiconductors
-
NXP Semiconductors. MIFARE Smartcard ICs. http://www.mifare.net/products/smartcardics/, Sept 2008
-
(2008)
MIFARE Smartcard Ics
-
-
-
49
-
-
0022793132
-
How to construct random functions
-
S. Micali, O. Goldreich, S. Goldwasser, How to construct random functions. J. ACM 33(4), 792-807 (1986)
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Micali, S.1
Goldreich, O.2
Goldwasser, S.3
-
50
-
-
85019663646
-
-
Presented at the RFID PrivacyWorkshop, MIT, Cambridge, MA, 15, rfidprivacy
-
M. Ohkubo, K. Suzuki, S. Kinoshita, in Cryptographic Approach to “Privacy-Friendly” Tags. Presented at the RFID PrivacyWorkshop (MIT, Cambridge, MA, 15 Nov 2003); rfidprivacy. ex.com/2003/agenda.php
-
(2003)
Cryptographic Approach to “Privacy-Friendly” Tags
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
51
-
-
33749994390
-
Efficient Hash-Chain Based RFID Privacy Protection Scheme
-
Tokyo, Japan, 11-14
-
M. Ohkubo, K. Suzuki, S. Kinoshita, in Efficient Hash-Chain Based RFID Privacy Protection Scheme. International Conference on Ubiquitous Computing (UbiComp), Workshop Privacy: Current Status and Future Directions, Tokyo, Japan, 11-14 Sept 2005
-
(2005)
International Conference on Ubiquitous Computing (Ubicomp), Workshop Privacy: Current Status and Future Directions
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
52
-
-
58349109583
-
On the security of HB# against a man-in-the-middle attack. In Advances in Cryptology - ASIACRYPT 2008
-
Melbourne, Australia, 7-11, Proceedings. Lecture Notes in Computer Science, Springer, 2008
-
K. Ouafi, R. Overbeck, S. Vaudenay, On the security of HB# against a man-in-the-middle attack. in Advances in Cryptology - ASIACRYPT 2008, ed. by J. Pieprzyk. 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, 7-11 Dec 2008, Proceedings. Lecture Notes in Computer Science, vol. 5350 (Springer, 2008), pp. 108-124
-
(2008)
14Th International Conference on the Theory and Application of Cryptology and Information Security
, vol.5350
, pp. 108-124
-
-
Ouafi, K.1
Overbeck, R.2
Vaudenay, S.3
-
53
-
-
70349118926
-
In Mutual Authentication in RFID: Security and Privacy
-
Alexandria, VA, USA, 27-31 Oct 2008, Computer and Communications Security, ACM Press
-
R.-I. Paise, S. Vaudenay, in Mutual Authentication in RFID: Security and Privacy. ASIACCS’ 08: Proceedings of the 2008 ACM Symposium on Information, Alexandria, VA, USA, 27-31 Oct 2008, Computer and Communications Security (ACM Press, 2008), pp. 292-299
-
(2008)
ASIACCS’ 08: Proceedings of the 2008 ACM Symposium on Information
, pp. 292-299
-
-
Paise, R.-I.1
Vaudenay, S.2
-
54
-
-
85019694714
-
-
Auto-ID Labs Research Workshop, Zurich, Switzerland, 23-24
-
D.C. Ranasinghe, D.W. Engels, P.H. Cole, in Security and Privacy: Modest Proposals for Low-Cost RFID Systems. Auto-ID Labs Research Workshop, Zurich, Switzerland, 23-24 Sept 2004
-
(2004)
Security and Privacy: Modest Proposals for Low-Cost RFID Systems
-
-
Ranasinghe, D.C.1
Engels, D.W.2
Cole, P.H.3
-
55
-
-
33749998666
-
An Improved LPN Algorithm. Security and Cryptography for Networks
-
Maiori, Italy, 6-8 Sept, Proceedings. Lecture Notes in Computer Science, (Springer
-
É. Levieil, P.-A. Fouque, in An Improved LPN Algorithm. Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, 6-8 Sept 2006, Proceedings. Lecture Notes in Computer Science, (Springer, 2006), pp. 348-359
-
(2006)
5Th International Conference, SCN 2006
, pp. 348-359
-
-
Levieil, É.1
Fouque, P.-A.2
-
56
-
-
80052993333
-
User Privacy in Transport Systems Based on RFID E-tickets
-
Malaga, Spain, 9
-
A.-R. Sadeghi, I. Visconti, C. Wachsmann, in User Privacy in Transport Systems Based on RFID E-tickets. International Workshop on Privacy in Location-Based Applications (PiLBA), Malaga, Spain, 9 Oct 2008
-
(2008)
International Workshop on Privacy in Location-Based Applications (Pilba)
-
-
Sadeghi, A.-R.1
Visconti, I.2
Wachsmann, C.3
-
57
-
-
71549125572
-
Anonymizer-Enabled Security and Privacy for RFID
-
12-14 Dec 2009, Kanazawa, Ishikawa, Japan. Lecture Notes in Computer Science, Springer
-
A.-R. Sadeghi, I. Visconti, C. Wachsmann, in Anonymizer-Enabled Security and Privacy for RFID. The 8th International Conference in Cryptography and Network Security, 12-14 Dec 2009, Kanazawa, Ishikawa, Japan. Lecture Notes in Computer Science (Springer, 2009)
-
(2009)
The 8Th International Conference in Cryptography and Network Security
-
-
Sadeghi, A.-R.1
Visconti, I.2
Wachsmann, C.3
-
58
-
-
70349088651
-
Location Privacy in RFID Applications
-
Springer, Aug
-
A.-R. Sadeghi, I. Visconti, C. Wachsmann, in Location Privacy in RFID Applications. Privacy in Location-Based Applications - Research Issues and Emerging Trends. Lecture Notes in Computer Science, vol. 5599 (Springer, Aug 2009), pp. 127-150
-
(2009)
Privacy in Location-Based Applications - Research Issues and Emerging Trends. Lecture Notes in Computer Science
, vol.5599
, pp. 127-150
-
-
Sadeghi, A.-R.1
Visconti, I.2
Wachsmann, C.3
-
59
-
-
35048904109
-
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags
-
Aizu-Wakamatsu City, Japan, Proceedings. Lecture Notes in Computer Science, (Springer, 2004)
-
J. Saito, J.-C. Ryou, K. Sakurai, in Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. International Conference on Embedded and Ubiquitous Computing (EUC), Aizu-Wakamatsu City, Japan, Aug 2004, Proceedings. Lecture Notes in Computer Science, vol. 3207 (Springer, 2004), pp. 879-890
-
(2004)
International Conference on Embedded and Ubiquitous Computing (EUC)
, vol.3207
, pp. 879-890
-
-
Saito, J.1
Ryou, J.-C.2
Sakurai, K.3
-
60
-
-
23944443170
-
Optical Fault Induction Attacks
-
Redwood Shores, CA, USA, 13-15, Revised Papers. Lecture Notes in Computer Science, (Springer Verlag, 2002)
-
S.P. Skorobogatov, R.J. Anderson, in Optical Fault Induction Attacks. 4th InternationalWorkshop on Cryptographic Hardware and Embedded Systems (CHES 2002), Redwood Shores, CA, USA, 13-15 Aug 2002, Revised Papers. Lecture Notes in Computer Science, vol. 2523 (Springer Verlag, 2002), pp. 31-48
-
(2002)
4Th Internationalworkshop on Cryptographic Hardware and Embedded Systems (CHES 2002)
, vol.2523
, pp. 31-48
-
-
Skorobogatov, S.P.1
Anderson, R.J.2
-
61
-
-
56749103027
-
RFID Authentication Protocol for Low-Cost Tags
-
Alexandria, VA, USA, 31 Mar-2 Apr 2008, ACM Press
-
B. Song, C.J. Mitchell, RFID Authentication Protocol for Low-Cost Tags. Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, USA, 31 Mar-2 Apr 2008 (ACM Press, 2008), pp. 140-147
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
62
-
-
79957448250
-
-
Sony Global. Web site of Sony FeliCa. http://www.sony.net/Products/felica/, June 2008
-
(2008)
Web Site of Sony Felica
-
-
-
64
-
-
33750290259
-
In YA-TRAP: Yet Another Trivial RFID Authentication Protocol
-
Pisa, Italy, 13-17 Mar 2006. Lecture Notes in Computer Science, IEEE Computer Society
-
G. Tsudik, in YA-TRAP: Yet Another Trivial RFID Authentication Protocol. Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, Pisa, Italy, 13-17 Mar 2006. Lecture Notes in Computer Science, vol. 2802 (IEEE Computer Society, 2006), pp. 640-643
-
(2006)
Proceedings of the 4Th Annual IEEE International Conference on Pervasive Computing and Communications Workshops
, vol.2802
, pp. 640-643
-
-
Tsudik, G.1
-
65
-
-
33745654539
-
In RFID-Tags for Anti-counterfeiting. The Cryptographers’ Track at the RSA Conference, San Jose, CA, USA, 13-17
-
(Springer, 2006)
-
P. Tuyls, L. Batina, in RFID-Tags for Anti-counterfeiting. The Cryptographers’ Track at the RSA Conference, San Jose, CA, USA, 13-17 Feb 2006, Proceedings. Lecture Notes on Computer Science, vol. 3860 (Springer, 2006), pp. 115-131
-
(2006)
Proceedings. Lecture Notes on Computer Science
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
66
-
-
84892351140
-
Security with Noisy Data - On Private Biometrics
-
(eds.), Springer, New York, NY
-
P. Tuyls, B. Škoriç, Tom Kevenaar (eds.), Security with Noisy Data - On Private Biometrics, Secure Key Storage, and Anti-Counterfeiting (Springer, New York, NY, 2007).
-
(2007)
Secure Key Storage, and Anti-Counterfeiting
-
-
Tuyls, P.1
Škoriç, B.2
Kevenaar, T.3
-
67
-
-
38149038702
-
In On Privacy Models for RFID
-
Kuching, Sarawak, Malaysia, 2-6, Proceedings. Lecture Notes in Computer Science, (Springer, 2007)
-
S. Vaudenay, in On Privacy Models for RFID. 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Sarawak, Malaysia, 2-6 Dec 2007 Proceedings. Lecture Notes in Computer Science, vol. 4833 (Springer, 2007), pp. 68-87
-
(2007)
13Th International Conference on the Theory and Application of Cryptology and Information Security
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
68
-
-
21144438831
-
In Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Germany, 12-14, Revised Papers. Lecture Notes in Computer Science, (Springer, 2003)
-
S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, in Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. 1st International Conference on Security in Pervasive Computing, Boppard, Germany, 12-14 Mar 2003 Revised Papers. Lecture Notes in Computer Science, vol. 2802 (Springer, 2003), pp. 50-59
-
(2003)
1St International Conference on Security in Pervasive Computing, Boppard
, vol.2802
, pp. 50-59
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|