Cryptography Reference
In-Depth Information
6. Gilbert, H., Robshaw, M.J.B., Seurin, Y.: HB : Increasing the security and effciency
of HB+. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 361-378.
Springer, Heidelberg (2008)
7. Munilla, J., Peinado, A.: HB-MP: A further step in the HB-family of lightweight
authentication protocols. Computer Networks (2007)
8. Madhavan, M., Thangaraj, A., Sankarasubramaniam, Y., Viswanathan, K.: NLHB:
A Non-Linear Hopper Blum Protocol. In: IEEE National Conference on Commu-
nications (NCC) 2010, CoRR abs/1001.2140 (2010)
9. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez Tapiador, J., Ribagorda, A.:
LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID
tags. In: RFIDSec 2006 (2006)
10. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A.:
M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In:
Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp.
912-923. Springer, Heidelberg (2006)
11. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A.:
EMAP: An Ecient Mutual-Authentication Protocol for Low-cost RFID tags. In:
OTM Federated Conferences and Workshop: IS Workshop (2006)
12. Avoine, G.: Adversarial Model for Radio Frequency Identification. Cryptology
ePrint Archive, Report 2005/049 (2005)
13. Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-
Friendly Tags. In: RFID Privacy Workshop (2003)
14. Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio
Frequency Identification Devices using Varying Identifiers. In: Proceedings of Per-
Sec 2004, IEEE PerCom, pp. 149-153 (2004)
15. Henrici, D., Muller, P.: Providing Security and Privacy in RFID Systems Using
Triggered Hash Chains. In: PerCom 2008, pp. 50-59 (2008)
16. Kulseng, L.S.: Lightweight Mutual Authentication, Owner Transfer, and Secure
Search Protocols for RFID Systems, Master Thesis, Iowa State University, Ames
(2009)
17. Alomair, B., Lazos, L., Poovendran, R.: Securing Low-cost RFID Systems: an Un-
conditionally Secure Approach. In: RFIDsec 2010, Asia, Singapore (2010)
18. Feller, W.: An Introduction to Probability Theory and its Applications. Wiley
India Pvt. Ltd, Chichester (2008)
19. Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., O'Hare, T.: Vulnerabilities
in first-generation RFID-enabled credit cards. In: Dietrich, S., Dhamija, R. (eds.)
FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 2-14. Springer, Heidelberg (2007)
20. Carluccio, D., Lemke, K., Paar, C.: E-passport: The global traceability or how to
feel like a UPS package. In: Lee, J.K., Yi, O., Yung, M. (eds.) WISA 2006. LNCS,
vol. 4298, pp. 391-404. Springer, Heidelberg (2007)
21. Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing
borders: Security and privacy issues of the european e-passport. In: Yoshiura, H.,
Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006.
LNCS, vol. 4266, pp. 152-167. Springer, Heidelberg (2006)
22. CASPIAN, Boycott Benetton (2007), http://www.boycottbenetton.com
23. Mitsubishi Electric Asia Switches on RFID (2006),
http://www.rfidjournal.com/article/articleview/2644/
24. Target, Wal-Mart Share EPC Data (2005),
http://www.rfidjournal.com/article/articleview/642/1/1/
 
Search WWH ::




Custom Search