Outsmarting smart cards
暂无分享,去创建一个
[1] H. Nyquist,et al. Certain factors affecting telegraph speed , 1924, Journal of the A.I.E.E..
[2] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[3] Flavio D. Garcia,et al. Modeling Privacy for Off-Line RFID Systems , 2010, CARDIS.
[4] Andrey Bogdanov,et al. Linear Slide Attacks on the KeeLoq Block Cipher , 2007, Inscrypt.
[5] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[6] H. Feistel. Cryptography and Computer Privacy , 1973 .
[7] Jacques Patarin,et al. Security of Random Feistel Schemes with 5 or More Rounds , 2004, CRYPTO.
[8] Steven J. Murdoch,et al. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.
[9] Yvo Desmedt,et al. Identification Tokens - or: Solving the Chess Grandmaster Problem , 1990, CRYPTO.
[10] Laura Brandán Briones,et al. Theories for Model-based Testing: Real-time and Coverage , 2007 .
[11] Hendrik Michaël van der Bijl,et al. On changing models in model-based testing , 2011 .
[12] Wolter Pieters,et al. Provable anonymity , 2005, FMSE '05.
[13] Nikolay Kavaldjiev,et al. A run-time reconfigurable Network-on-Chip for streaming DSP applications , 2006 .
[14] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[15] Martin Bravenboer,et al. Exercises in Free Syntax. Syntax Definition, Parsing, and Assimilation of Language Conglomerates , 2003 .
[16] Aad Mathssen,et al. Logical Calculi for Reasoning with Binding , 2008 .
[17] Bart Jacobs,et al. Logical Formalisation and Analysis of the Mifare Classic Card in PVS , 2011, ITP.
[18] A. Juels,et al. The security implications of VeriChip cloning. , 2006, Journal of the American Medical Informatics Association : JAMIA.
[19] Ari Juels,et al. Defining Strong Privacy for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[20] Wolfgang Kowalsky,et al. Large Area Electronics Using Printing Methods , 2005, Proceedings of the IEEE.
[21] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[22] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[23] Jeroen Doumen,et al. Searching in encrypted data , 2004 .
[24] Thomas Bäck,et al. Mixed-integer evolution strategies for parameter optimization and their applications to medical image analysis , 2005 .
[25] Flavio D. Garcia,et al. Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research , 2012 .
[26] Christof Paar,et al. Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed , 2009, AFRICACRYPT.
[27] van Mf Marcel Amstel,et al. Assessing and improving the quality of model transformations , 2012 .
[28] Jovan Dj. Golic,et al. Cryptanalysis of Alleged A5 Stream Cipher , 1997, EUROCRYPT.
[29] Jan Tretmans,et al. Model Based Testing with Labelled Transition Systems , 2008, Formal Methods and Testing.
[30] Flavio D. Garcia,et al. Towards a Practical Solution to the RFID Desynchronization Problem , 2010, RFIDSec.
[31] Ingrid Verbauwhede,et al. Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs , 2012, CT-RSA.
[32] Basel Alomair,et al. Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2010, IEEE Transactions on Parallel and Distributed Systems.
[33] Arthur I. Baars,et al. Embedded Compilers , 2009 .
[34] Mohammad Ali Abam. New data structures and algorithms for mobile data , 2007 .
[35] Ljp Luc Engelen. From napkin sketches to reliable software , 2012 .
[36] M Muhammad Atif,et al. Formal modeling and verification of distributed failure detectors , 2011 .
[37] Adriaan Middelkoop,et al. Inference of Program Properties with Attribute Grammars, Revisited , 2012 .
[38] Nicolas Courtois,et al. The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime , 2009, SECRYPT.
[39] Joeri de Ruiter,et al. The SmartLogic Tool: Analysing and Testing Smart Card Protocols , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.
[40] Muhammad Torabi Dashti,et al. A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[41] Pascal Durr,et al. Resource-based Verification for Robust Composition of Aspects , 2008 .
[42] Melanie R. Rieback,et al. Security and Privacy of Radio Frequency Identification , 2008 .
[43] Mari Antonius Cornelis Dekker,et al. Flexible Access Control for Dynamic Collaborative Environments , 2009 .
[44] Karsten Nohl,et al. Peeling Away Layers of an RFID Security System , 2011, Financial Cryptography.
[45] Juan E. Tapiador,et al. RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.
[46] Joeri de Ruiter,et al. Designed to Fail: A USB-Connected Reader for Online Banking , 2012, NordSec.
[47] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) , 2007, Journal of Cryptology.
[48] Magiel Bruntink,et al. Renovation of idiomatic crosscutting concerns in embedded systems , 2005 .
[49] M. T. de Berg,et al. Multi-functional geometric data structures , 2003 .
[50] M. D. Berg,et al. Optimal Geometric Data Structures , 2007 .
[51] Anton Wijs,et al. Silent steps in transition systems and Markov chains , 2007 .
[52] Werner Heijstek,et al. Architecture design in global and model-centric software development , 2012 .
[53] Gildas Avoine,et al. The Swiss-Knife RFID Distance Bounding Protocol , 2008, ICISC.
[54] Sander Vermolen,et al. Software Language Evolution , 2008, 2008 15th Working Conference on Reverse Engineering.
[55] John Gilmore,et al. Cracking DES - secrets of encryption research, wiretap politics and chip design: how federal agencies subvert privacy , 1998 .
[56] Kris Myny,et al. Comparison of organic diode structures regarding high-frequency rectification behavior in radio-frequency identification tags , 2006 .
[57] Flavio D. Garcia,et al. Exposing iClass Key Diversification , 2011, WOOT.
[58] Eu-Jin Goh,et al. Searching on Encrypted Data , 2003 .
[59] Mohammad Mahdi Jaghoori,et al. Time At Your Service: Schedulability Analysis of Real-Time and Distributed Services , 2010 .
[60] B. J. Arnoldus,et al. An illumination of the template enigma : software code generation with templates , 2011 .
[61] M. Attaran. RFID: an enabler of supply chain operations , 2007 .
[62] Omar Choudary. The smart card detective: a hand-held EMV interceptor , 2012 .
[63] A Adam Koprowski,et al. Termination of rewriting and its certification , 2004 .
[64] Ronald L. Rivest,et al. Still Guarding Secrets after Years of Attacks , RSA Earns Accolades for its Founders , 2003 .
[65] Bogdan Warinschi,et al. Soundness of Formal Encryption in the Presence of Active Adversaries , 2004, TCC.
[66] Christof Paar,et al. Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards , 2012, 2012 IEEE Symposium on Security and Privacy.
[67] B. Lijnse,et al. TOP to the rescue. Task-oriented programming for incident response applications , 2005 .
[68] Jens R. Calamé,et al. Testing reactive systems with data: enumerative methods and constraint solving , 2008 .
[69] Gerhard Fettweis,et al. A new network processor architecture for high-speed communications , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).
[70] Scw Bas Ploeger,et al. Improved verification methods for concurrent systems , 2009 .
[71] Jacques Patarin,et al. New Results on Pseudorandom Permutation Generators Based on the DES Scheme , 1991, CRYPTO.
[72] J. Kwisthout,et al. The Computational Complexity of Probabilistic Networks , 2009 .
[73] Marcin Czenko,et al. TuLiP : reshaping trust management , 2009 .
[74] Roy Want,et al. An introduction to RFID technology , 2006, IEEE Pervasive Computing.
[75] Moni Naor,et al. On the Construction of Pseudorandom Permutations: Luby—Rackoff Revisited , 1996, Journal of Cryptology.
[76] Yanjing Wang,et al. Epistemic Modelling and Protocol Dynamics , 2010 .
[77] Jacques Patarin,et al. About Feistel Schemes with Six (or More) Rounds , 1998, FSE.
[78] Iris Loeb. Natural Deduction, Sharing By Presentation , 2007 .
[79] Z Zvezdan Protic,et al. Configuration management for models : generic methods for model comparison and model co-evolution , 2011 .
[80] Flavio D. Garcia,et al. Dismantling iClass and iClass Elite , 2012, ESORICS.
[81] Ncwm Niels Braspenning. Model-based integration and testing of high-tech multi-disciplinary systems , 2008 .
[82] Kab Kevin Verbeek. Algorithms for cartographic visualization , 2012 .
[83] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[84] H. Zimmermann,et al. OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.
[85] de A. Bruin,et al. Service-oriented discovery of knowledge : foundations, implementations and applications , 2010 .
[86] T. van der Storm. Component-based configuration, integration and delivery , 2003 .
[87] Karina R. Olmos Joffré. Strategies for Context Sensitive Program Transformation , 2009 .
[88] Ivan S. Zapreev. Model checking Markov chains : techniques and tools , 2008 .
[89] Seyyed Hamed Hashemi,et al. Studies on verification of wireless sensor networks and abstraction learning for system inference , 2008 .
[90] Tom Staijen,et al. Graph-based Specification and Verification for Aspect-Oriented Languages , 2010 .
[91] Lennart C. L. Kats,et al. Building Blocks for Language Workbenches , 2011 .
[92] M. G. van der Horst,et al. Scalable block processing algorithms , 2008 .
[93] K. Tsirogiannis,et al. Analysis of flow and visibility on triangulated terrains , 2011 .
[94] RH Rudolf Mak,et al. Design and performance analysis of data-independent stream processing systems , 2008 .
[95] Wolfgang Rankl,et al. Smart Card Handbook , 1997 .
[96] Serge Vaudenay,et al. On Privacy Models for RFID , 2007, ASIACRYPT.
[97] Taolue Chen. Clocks, Dice and Processes , 2009 .
[98] S. Georgievska. Probability and Hiding in Concurrent Processes ( thesis abstract ) , 2011 .
[99] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[100] Martijn van Veelen,et al. Considerations on modeling for early detection of abnormalities in locally autonomous distributed systems , 2007 .
[101] Ichiro Hasuo,et al. Tracing Anonymity with Coalgebras , 2008 .
[102] Bart Jacobs,et al. Dismantling MIFARE Classic , 2008, ESORICS.
[103] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[104] Gildas Avoine,et al. A privacy-restoring mechanism for offline RFID systems , 2012, WISEC '12.
[105] Farhad Arbab,et al. Model Checking of Component Connectors , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[106] Georgeta Igna,et al. Performance analysis of real-time task systems using timed automata , 2013 .
[107] Gerhard de Koning Gans. Analysis of the MIFARE Classic used in the OV-Chipkaart project , 2008 .
[108] W. Kuijper. Compositional Synthesis of Safety Controllers , 2012 .
[109] Li Liu,et al. RFID Application in Hospitals: A Case Study on a Demonstration RFID Project in a Taiwan Hospital , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[110] Flavio D. Garcia,et al. A Practical Attack on the MIFARE Classic , 2008, CARDIS.
[111] J. K. Berendsen,et al. Abstraction, prices and probability in model checking timed automata , 2010 .
[112] Flaminia L. Luccio,et al. Secure Recharge of Disposable RFID Tickets , 2011, Formal Aspects in Security and Trust.
[113] Shai Halevi,et al. Tree-based HB protocols for privacy-preserving authentication of RFID tags , 2011, J. Comput. Secur..
[114] Hsiao-Cheng Yu,et al. Challenges to Global RFID Adoption , 2006, 2006 Technology Management for the Global Future - PICMET 2006 Conference.
[115] Andrew S. Tanenbaum,et al. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.
[116] Lei Hu,et al. Cube Cryptanalysis of Hitag2 Stream Cipher , 2011, CANS.
[117] D. Costa. Formal models for component connectors , 2010 .
[118] Saeed Sedghi,et al. Towards Provably Secure Efficiently Searchable Encryption , 2012 .
[119] Eric R. Verheul,et al. Best Effort and Practice Activation Codes , 2011, TrustBus.
[120] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[121] Samy Bengio,et al. Special Uses and Abuses of the Fiat-Shamir Passport Protocol , 1987, CRYPTO.
[122] Martin R. Neuhäußer,et al. Model checking nondeterministic and randomly timed systems , 2010 .
[123] Erik Tews,et al. Attacks on the DECT Authentication Mechanisms , 2009, CT-RSA.
[124] Christian Krause,et al. Reconfigurable Component Connectors , 2011 .
[125] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[126] Vivek Subramanian,et al. Progress Toward Development of All-Printed RFID Tags: Materials, Processes, and Devices , 2005, Proceedings of the IEEE.
[127] Robert Brijder,et al. Models of natural computation : gene assembly and membrane systems , 2008 .
[128] U Uzma Khadim,et al. Process algebras for hybrid systems : comparison and development , 2008 .
[129] van Pja Paul Tilburg. From computability to executability : a process-theoretic view on automata theory , 2011 .
[130] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[131] David Evans,et al. Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.
[132] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[133] Fpm Frank Stappers. Bridging formal models : an engineering perspective , 2012 .
[134] Gürcan Gülesir,et al. Evolvable Behavior Specifications Using Context-Sensitive Wildcards , 2008 .
[135] Flavio D. Garcia,et al. Security Flaw in MIFARE Classic , 2008 .
[136] R.S.S. O'Connor,et al. Incompleteness & completeness : formalizing logic and analysis in type theory , 2005 .
[137] Roel Verdult,et al. Practical Attacks on NFC Enabled Cell Phones , 2011, 2011 Third International Workshop on Near Field Communication.
[138] C. J. Boogerd,et al. Focusing Automatic Code Inspections , 2010 .
[139] Aah Ammar Osaiweran. Formal development of control software in the medical systems domain , 2012 .
[140] M. Torabi Dashti,et al. Keeping Fairness Alive : Design and formal verification of optimistic fair exchange protocols , 2008 .
[141] Hugo Jonker,et al. Security matters : privacy in voting and fairness in digital exchange , 2009 .
[142] Flavio D. Garcia,et al. Wirelessly Pickpocketing a Mifare Classic Card , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[143] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[144] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[145] Flavio D. Garcia,et al. A Toolbox for RFID Protocol Analysis , 2012 .
[146] Jayanti Venkataraman,et al. Printing Radio Frequency Identification (RFID) Tag Antennas Using Inks Containing Silver Dispersions , 2005 .
[147] Sebastiaan Gijsbert Marinus Cornelissen,et al. Evaluating Dynamic Analysis Techniques for Program Comprehension , 2009 .
[148] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[149] Claude Castelluccia,et al. Extending SAT Solvers to Cryptographic Problems , 2009, SAT.
[150] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[151] T. D. Vu,et al. Semantics and applications of process and program algebra , 2007 .
[152] Bas Basten,et al. Ambiguity Detection for Programming Language Grammars , 2011 .
[153] Hasan Sözer,et al. Architecting Fault-Tolerant Software Systems , 2009 .
[154] Jean-Jacques Quisquater,et al. Practical Algebraic Attacks on the Hitag2 Stream Cipher , 2009, ISC.
[155] Harmen Kastenberg. Graph-based software specification and verification , 2008 .
[156] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[157] Flavio D. Garcia,et al. Sound Computational Interpretation of Symbolic Hashes in the Standard Model , 2006, IWSEC.
[158] Arjen van Weelden,et al. Putting Types To Good Use , 2007 .
[159] Gerhard P. Hancke,et al. Design of a secure distance-bounding channel for RFID , 2011, J. Netw. Comput. Appl..
[160] Somayeh Malakuti Khah Olun Abadi. Event composition model: achieving naturalness in runtime enforcement , 2011 .
[161] Dan S. Wallach,et al. Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[162] R. Boumen,et al. Integration and test plans for complex manufacturing systems , 2007 .
[163] Ronald Middelkoop,et al. Capturing and exploiting abstract views of states in OO verification , 2011 .
[164] Marius Adrian Marin,et al. An Integrated System to Manage Crosscutting Concerns in Source Code , 2008 .
[165] Mohammed G. Khatib. MEMS-Based Storage Devices : Integration in Energy-Constrained Mobile Systems , 2009 .
[166] Kirti Chopra,et al. Physics Behind RFID Smart Card Security In Context Of Privacy , 2010 .
[167] van Mj Muck Weerdenburg,et al. Efficient rewriting techniques , 2009 .
[168] José Proença,et al. Synchronous Coordination of Distributed Components , 2011 .
[169] Tingting Han,et al. Diagnosis, Synthesis and Analysis of Probabilistic Models , 2009, Ausgezeichnete Informatikdissertationen.
[170] Dong Hoon Lee,et al. Cryptanalysis of INCrypt32 in HID's iCLASS Systems , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[171] Natarajan Shankar,et al. Formal Verification for Fault-Tolerant Architectures: Prolegomena to the Design of PVS , 1995, IEEE Trans. Software Eng..
[172] J. Endrullis. Termination and Productivity , 2010 .
[173] Lars R. Knudsen,et al. The Security of Feistel Ciphers with Six Rounds or Less , 2002, Journal of Cryptology.
[174] Raluca Marin-Perianu,et al. Wireless Sensor Networks in Motion - Clustering Algorithms for Service Discovery and Provisioning , 2008 .
[175] Tim K. Cocx,et al. Algorithmic tools for data-oriented law enforcement , 2009 .
[176] Gregor von Bochmann,et al. Formal Methods in Communication Protocol Design , 1980, IEEE Trans. Commun..
[177] de Ism Ivo Jong. Integration and test strategies for complex manufacturing machines , 2008 .
[178] R. Bakhshi. Gossiping Models : Formal Analysis of Epidemic Protocols , 2011 .
[179] de Hayco Jong. Flexible heterogeneous software systems , 2007 .
[180] Mike Burmester,et al. Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries , 2008, Int. J. Appl. Cryptogr..
[181] Flavio D. Garcia. Formal and Computational Cryptography: Protocols, Hashes and Commitments , 2008 .
[182] Shien-Chiang Yu,et al. RFID implementation and benefits in libraries , 2007, Electron. Libr..
[183] Werner Schindler,et al. Random Number Generators for Cryptographic Applications , 2009, Cryptographic Engineering.
[184] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[185] A. Morali,et al. IT architecture-based confidentiality risk assessment in networks of organizations , 2011 .
[186] Lejla Batina,et al. Using NFC Phones for Proving Credentials , 2012, MMB/DFT.
[187] Stephanie Kemper,et al. Modelling and analysis of real-time coordination patterns , 2011 .
[188] Mike Bond,et al. 2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .
[189] Bin Zhang,et al. Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF , 2011, ACNS.
[190] D. Graaf,et al. Mining semi-structured data, theoretical and experimental aspects of pattern evaluation , 2008 .
[191] Ileana Buhan,et al. Cryptographic keys from noisy data, theory and applications , 2008 .
[192] E Elena Mumford,et al. Drawing graphs for cartographic applications , 2008 .
[193] M. T. de Berg,et al. Algorithms for Fat Objects: Decompositions and Applications , 2004 .
[194] Iwen Coisel. Data Synchronization in Privacy-Preserving RFID Authentication Schemes , 2008 .
[195] Flavio D. Garcia,et al. Sound Computational Interpretation of Formal Hashes , 2006, IACR Cryptol. ePrint Arch..
[196] Lacramioara Astefanoaei,et al. An executable theory of multi-agent systems refinement , 2011 .
[197] van Mpwj Michiel Osch. Automated model-based testing of hybrid systems , 2009 .
[198] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[199] Matthew J. B. Robshaw,et al. PRINTcipher: A Block Cipher for IC-Printing , 2010, CHES.
[200] Tim K. Cocx,et al. Metrics and visualisation for crime analysis and genomics , 2005 .
[201] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[202] Bastiaan Stephan Graaf,et al. Model-Driven Evolution of Software Architectures , 2007, 11th European Conference on Software Maintenance and Reengineering (CSMR'07).
[203] Miguel E. Andrés,et al. Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems , 2011, ArXiv.
[204] A. L. de Groot,et al. Practical Automaton proofs in PVS , 2000 .
[205] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[206] Gildas Avoine,et al. Privacy-friendly synchronized ultralightweight authentication protocols in the storm , 2012, J. Netw. Comput. Appl..
[207] Flavio D. Garcia,et al. Gone in 360 Seconds: Hijacking with Hitag2 , 2012, USENIX Security Symposium.
[208] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[209] Jasen Markovski,et al. Real and stochastic time in process algebras for performance evaluation , 2008 .
[210] Flavio D. Garcia,et al. Sound and complete computational interpretation of symbolic hashes in the standard model , 2006, Theor. Comput. Sci..
[211] Flavio D. Garcia. Proof of concept , cloning the OV-Chip card Public transport system in The Netherlands , 2008 .
[212] Ali Mesbah,et al. Analysis and Testing of Ajax-based Single-page Web Applications , 2009 .
[213] M. J. de Mol,et al. Reasoning about functional programs : Sparkle, a proof assistant for Clean , 2009 .
[214] Carl Eklund,et al. National Institute for Standards and Technology , 2009, Encyclopedia of Biometrics.
[215] Wolter Pieters,et al. La volonté machinale: understanding the electronic voting controversy , 2008 .
[216] Eduardo Zambon,et al. Abstract Graph Transformation - Theory and Practice , 2013 .
[217] Frederik Vercauteren,et al. On the Claimed Privacy of EC-RAC III , 2010, RFIDSec.
[218] Yossi Sheffi,et al. RFID AND THE INNOVATION CYCLE , 2004 .
[219] H. Nyquist,et al. Certain Topics in Telegraph Transmission Theory , 1928, Transactions of the American Institute of Electrical Engineers.
[220] Flavio D. Garcia,et al. Dismantling SecureMemory, CryptoMemory and CryptoRF , 2010, CCS '10.
[221] Dmitri Jarnikov,et al. QoS framework for video streaming in home networks , 2007 .
[222] Martin Novotný,et al. Breaking Hitag2 with Reconfigurable Hardware , 2011, 2011 14th Euromicro Conference on Digital System Design.
[223] Olivier Billet,et al. An efficient forward private RFID protocol , 2009, CCS.
[224] Trajce Dimkov,et al. Alignment of organizational security policies: Theory and Practice , 2012 .
[225] D. E. Nadales Agut,et al. A Compositional Interchange Format for Hybrid Systems: Design and Implementation , 2012 .
[226] Amir Rahmati,et al. TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks , 2012, USENIX Security Symposium.
[227] Yi Mu,et al. New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing , 2009, ESORICS.
[228] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[229] Milosch Meriac. Heart of Darkness-exploring the uncharted backwaters of HID iCLASS , 2010 .
[230] Juan E. Tapiador,et al. Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol , 2010, RFIDSec.
[231] Hossein Rahmani,et al. Analysis of protein-protein interaction networks by means of annotated graph mining algorithms , 2012 .
[232] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[233] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[234] Herbert Bos,et al. Howard: A Dynamic Excavator for Reverse Engineering Data Structures , 2011, NDSS.
[235] EM Elena Bortnik,et al. Formal methods in support of SMC design , 2008 .
[236] Flavio D. Garcia,et al. Computational Soundness of Non-Malleable Commitments , 2008, ISPEC.
[237] Anton Wijs,et al. What to do next? Analysing and optimising system behaviour in time , 2007 .
[238] Bart Jacobs,et al. Crossing Borders: Security and Privacy Issues of the European e-Passport , 2006, IWSEC.
[239] Damiano Bolzoni,et al. Revisiting Anomaly-based Network Intrusion Detection Systems , 2009 .
[240] Marcel Verhoef,et al. Modeling and validating distributed embedded real-time control systems , 2009 .
[241] Young-Joo Moon,et al. Stochastic models for quality of service of component connectors , 2011 .
[242] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[243] J. van den Berg,et al. Reasoning about Java programs in PVS using JML , 2009 .
[244] A. Rodriguez Yakushev,et al. Towards Getting Generic Programming Ready for Prime Time , 2009 .
[245] Oscar H. Ibarra,et al. On spiking neural P systems , 2006, Natural Computing.
[246] Cfj Christian Lange,et al. Assessing and improving the quality of modeling : a series of empirical studies about the UML , 2007 .