Revisiting DoS Attacks and Privacy in RFID-Enabled Networks
暂无分享,去创建一个
[1] Ari Juels,et al. Defining Strong Privacy for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[2] Mike Burmester,et al. Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols , 2006, 2006 Securecomm and Workshops.
[3] Martín Abadi,et al. Code-Carrying Authorization , 2008, ESORICS.
[4] Ahmad-Reza Sadeghi,et al. User Privacy in Transport Systems Based on RFID E-Tickets , 2008, PiLBA.
[5] Gildas Avoine. Adversarial Model for Radio Frequency Identification , 2005, IACR Cryptol. ePrint Arch..
[6] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[7] Yi Mu,et al. RFID Privacy Models Revisited , 2008, ESORICS.
[8] Serge Vaudenay,et al. On Privacy Models for RFID , 2007, ASIACRYPT.
[9] Ahmad-Reza Sadeghi,et al. Anonymizer-Enabled Security and Privacy for RFID , 2009, CANS.
[10] Kaoru Kurosawa,et al. Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings , 2007, International Conference on the Theory and Application of Cryptology and Information Security.
[11] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.
[12] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[13] Ivan Damgård,et al. RFID Security: Tradeoffs between Security and Efficiency , 2008, CT-RSA.