Maximalist Cryptography and Computation on the WISP UHF RFID Tag
暂无分享,去创建一个
Kevin Fu | Joshua R. Smith | Mastooreh Salajegheh | Hee-Jin Chae | Daniel Yeager | Kevin Fu | M. Salajegheh | D. Yeager | Hee-Jin Chae
[1] P. Israsena. Securing ubiquitous and low-cost RFID using tiny encryption algorithm , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[2] Andrew S. Tanenbaum,et al. A Platform for RFID Security and Privacy Administration (Awarded Best Paper!) , 2006, LISA.
[3] Kevin Fu,et al. Cryptanalysis of Two Lightweight RFID Authentication Schemes , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[4] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[5] Selwyn Piramuthu,et al. HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication , 2006 .
[6] Joshua R. Smith,et al. Design of a Passively-Powered, Programmable Sensing Platform for UHF RFID Systems , 2007, 2007 IEEE International Conference on RFID.
[7] Daesung Kwon,et al. Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005 , 2006, EUC Workshops.
[8] Tieyan Li,et al. Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols , 2007, SEC.
[9] Sébastien Canard,et al. Low-Cost Cryptography for Privacy in RFID Systems , 2006, CARDIS.
[10] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[11] Fan Zhang,et al. A 9.2µA gen 2 compatible UHF RFID sensing tag with −12dBm Sensitivity and 1.25µVrms input-referred noise floor , 2010, 2010 IEEE International Solid-State Circuits Conference - (ISSCC).
[12] Alanson P. Sample,et al. A Wirelessly-Powered Platform for Sensing and Computation , 2006, UbiComp.
[13] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[14] Kazukuni Kobara,et al. Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[15] M. Aigner. Secure Symmetric Authentication for RFID Tags , 2005 .
[16] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[17] Juan E. Tapiador,et al. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.
[18] Pedro Peris-López,et al. LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags , 2006 .
[19] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[20] Damith C. Ranasinghe,et al. A Low Cost Solution to Authentication in Passive RFID Systems , 2006, ASILOMAR 2006.
[21] Kevin Fu,et al. CCCP: Secure Remote Storage for Computational RFIDs , 2009, USENIX Security Symposium.
[22] Kevin Fu,et al. Getting Things Done on Computational RFIDs with Energy-Aware Checkpointing and Voltage-Aware Scheduling , 2008, HotPower.