RFID. Security and Privacy
暂无分享,去创建一个
[1] Gildas Avoine,et al. RFID Distance Bounding Multistate Enhancement , 2009, INDOCRYPT.
[2] Cédric Lauradoux,et al. Distance Bounding Protocols on TH-UWB Radios , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[3] Ventzislav Nikov,et al. Yet Another Secure Distance-Bounding Protocol , 2008, SECRYPT.
[4] Ahmad-Reza Sadeghi,et al. PUF-Enhanced RFID Security and Privacy , 2010 .
[5] Gerhard P. Hancke,et al. Attacking smart card systems: Theory and practice , 2009, Inf. Secur. Tech. Rep..
[6] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[7] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[8] Markku-Juhani O. Saarinen. Cryptographic Analysis of All 4 x 4 - Bit S-Boxes , 2011, IACR Cryptol. ePrint Arch..
[9] Orhun Kara,et al. Optimal Security Limits of RFID Distance Bounding Protocols , 2010, RFIDSec.
[10] Gildas Avoine,et al. The Swiss-Knife RFID Distance Bounding Protocol , 2008, ICISC.
[11] Gerhard P. Hancke. Practical attacks on proximity identification systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[12] Juan Manuel González Nieto,et al. Detecting relay attacks with timing-based protocols , 2007, ASIACCS '07.
[13] Lars Skaar Kulseng. Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems , 2009 .
[14] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[15] Adi Shamir,et al. Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..
[16] J. Conway. On Numbers and Games , 1976 .
[17] Samy Bengio,et al. Special Uses and Abuses of the Fiat-Shamir Passport Protocol , 1987, CRYPTO.
[18] D. Engels,et al. Security and Privacy : Modest Proposals for Low-Cost RFID Systems # , 2004 .
[19] Daniel E. Holcomb,et al. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags , 2007 .
[20] Bart Preneel,et al. Key Establishment Using Secure Distance Bounding Protocols , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[21] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[22] Gildas Avoine,et al. The Poulidor Distance-Bounding Protocol , 2010, RFIDSec.
[23] Yuanfei Tu. RFID Distance Bounding Protocols , 2007 .
[24] Leonid Bolotnyy,et al. Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[25] Laurent Bussard,et al. Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks , 2005, SEC.
[26] Cédric Lauradoux,et al. A framework for analyzing RFID distance bounding protocols , 2011, J. Comput. Secur..
[27] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[28] Martin Hlavác,et al. A Note on the Relay Attacks on e-passports: The Case of Czech e-passports , 2007, IACR Cryptol. ePrint Arch..
[29] Danny Dolev,et al. On the security of public key protocols , 1983, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[30] Yvo Desmedt,et al. Identification Tokens - or: Solving the Chess Grandmaster Problem , 1990, CRYPTO.
[31] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[32] Serge Vaudenay,et al. On Privacy Models for RFID , 2007, ASIACRYPT.
[33] Bruce Schneier,et al. Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive , 2003, FSE.
[34] Gerhard P. Hancke,et al. Confidence in smart token proximity: Relay attacks revisited , 2009, Comput. Secur..
[35] T. Good,et al. Hardware results for selected stream cipher candidates , 2007 .
[36] Alex Biryukov,et al. On Multiple Linear Approximations , 2004, IACR Cryptol. ePrint Arch..
[37] Morris J. Dworkin,et al. SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC , 2007 .
[38] Jorge Munilla,et al. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels , 2008 .
[39] Guang Gong,et al. Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[40] Gerhard P. Hancke,et al. A Practical Relay Attack on ISO 14443 Proximity Cards , 2005 .
[41] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.