eRIPP-FS: Enforcing privacy and security in RFID
暂无分享,去创建一个
Roberto Di Pietro | Luigi V. Mancini | Mauro Conti | Angelo Spognardi | M. Conti | R. D. Pietro | L. Mancini | A. Spognardi
[1] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[2] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[3] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[4] Markus Jakobsson,et al. Fractal hash sequence representation and traversal , 2002, Proceedings IEEE International Symposium on Information Theory,.
[5] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[6] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[7] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[8] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[9] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[10] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[11] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[12] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[13] Juels,et al. HB and Related Lightweight Authentication Protocols for Secure RFID Tag / Reader Authentication ∗ , 2006 .
[14] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[15] Julien Bringer,et al. HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[16] Mike Burmester,et al. Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols , 2006, 2006 Securecomm and Workshops.
[17] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[18] Ari Juels,et al. Defining Strong Privacy for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[19] Mike Burmester,et al. Forward-secure RFID Authentication and Key Exchange , 2007, IACR Cryptol. ePrint Arch..
[20] Roberto Di Pietro,et al. Information Confinement, Privacy, and Security in RFID Systems , 2007, ESORICS.
[21] Gene Tsudik. A Family of Dunces: Trivial RFID Identification and Authentication Protocols , 2007, Privacy Enhancing Technologies.
[22] R. Di Pietro,et al. FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronisation , 2007, IECON 2007 - 33rd Annual Conference of the IEEE Industrial Electronics Society.
[23] Roberto Di Pietro,et al. RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[24] Maire O'Neill,et al. Low-Cost SHA-1 Hash Function Architecture for RFID Tags , 2008 .
[25] Serge Vaudenay,et al. Mutual authentication in RFID: security and privacy , 2008, ASIACCS '08.
[26] Adi Shamir. SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags , 2008, FSE.
[27] 聂鹏. EPCglobal Class 1 Gen 2标准的RFID高效双向认证协议 , 2011 .
[28] C. Chatmon. Secure Anonymous RFID Authentication Protocols , 2022 .