AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Http www ec firstclass org1/11/2024 ![]() Juels, A., Weis, S.: Defining strong privacy for RFID. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (September 2005) ![]() Springer, Heidelberg (2010)Īvoine, G.: Adversary model for radio frequency identification. In: The 2nd International Conference on Mobile Lightweight Wireless Systems, Mobilight 2010. Lee, Y.K., Batina, L., Singelée, D., Verbauwhede, I.: Wide-weak privacy-preserving RFID authentication protocols. In: 3rd ACM Conference on Wireless Network Security, WiSec 2010 (2010) Lee, Y.K., Batina, L., Singelée, D., Verbauwhede, I.: Low-cost untraceable authentication protocols for RFID. In: Proceedings of the 2008 IEEE International Conference on RFID, pp. Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In: IEEE International Conference on RFID – RFID 2009, Orlando, Florida, USA, pp. Lee, Y., Batina, L., Verbauwhede, I.: Untraceable RFID authentication protocols: Revision of EC-RAC. Tzeng, W.G., Hu, C.M.: Inter-protocol interleaving attacks on some authentication and key distribution protocols. IEEE Computer Society, Austria (April 2006) of The First International Conference on Availability, Reliability and Security (ARES), pp. Information and Computation 206, 425–459 (2008)Ĭremers, C.: Feasibility of multi-protocol attacks. 136–145 (2001)Īndova, S., Cremers, C., Gjøsteen, K., Mauw, S., Mjølsnes, S., Radomirović, S.: A framework for compositional verification of security protocols. 91–104 (1997)Ĭanetti, R.: Universally composable security: A new paradigm for cryptographic protocols. Kelsey, J., Schneier, B., Wagner, D.: Protocol interactions and the chosen protocol attack. Heintze, N., Tygar, J.D.: A model for secure protocols and their compositions. Cryptology ePrint Archive, Report 2008/310 (August 2009), Van Deursen, T., Radomirović, S.: Attacks on RFID protocols (version 1.1).
0 Comments
Read More
Leave a Reply. |