"Yoking-proofs" for RFID tags
暂无分享,去创建一个
[1] Victor Shoup,et al. On Formal Models for Secure Key Exchange , 1999, IACR Cryptol. ePrint Arch..
[2] Daniel W. Engels,et al. I. Radio-Frequency Identification: Security Risks and Challenges , 2003 .
[3] Kazuo Takaragi,et al. An Ultra Small Individual Recognition Security Chip , 2001, IEEE Micro.
[4] Andries E. Brouwer,et al. The linear programming bound for binary linear codes , 1993, IEEE Trans. Inf. Theory.
[5] D. McCullagh. RFID tags : Big Brother in small pachkages , 2003 .
[6] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[7] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[8] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[9] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[12] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[13] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[14] Daniel W. Engels,et al. Radio Frequency Identification and the Electronic Product Code , 2001, IEEE Micro.
[15] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.