Another Fallen Hash-Based RFID Authentication Protocol (English)
- New search for: Hernandez-Castro, J.C.
- New search for: Peris-Lopez, P.
- New search for: Safkhani, M.
- New search for: Bagheri, N.
- New search for: Naderi, M.
- New search for: International Federation for Information Processing
- New search for: IFIP WG 11.2
- New search for: Hernandez-Castro, J.C.
- New search for: Peris-Lopez, P.
- New search for: Safkhani, M.
- New search for: Bagheri, N.
- New search for: Naderi, M.
- New search for: Askoxylakis, Ioannis
- New search for: Pohls, Henrich C.
- New search for: Posegga, Joachim
- New search for: International Federation for Information Processing
- New search for: IFIP WG 11.2
In:
Workshop in information security theory and practice; security, privacy and trust in computing systems and ambient intelligent ecosystems; WISTP 2012
7322
;
29-37
;
2012
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Another Fallen Hash-Based RFID Authentication Protocol
-
Contributors:Hernandez-Castro, J.C. ( author ) / Peris-Lopez, P. ( author ) / Safkhani, M. ( author ) / Bagheri, N. ( author ) / Naderi, M. ( author ) / Askoxylakis, Ioannis / Pohls, Henrich C. / Posegga, Joachim / International Federation for Information Processing / IFIP WG 11.2
-
Conference:6th, Workshop in information security theory and practice; security, privacy and trust in computing systems and ambient intelligent ecosystems; WISTP 2012 ; 2012 ; Egham, UK
-
Published in:LECTURE NOTES IN COMPUTER SCIENCE , 7322 ; 29-37
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2012-01-01
-
Size:9 pages
-
Remarks:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Recent Developments in Low-Level Software SecurityAgten, P. / Nikiforakis, N. / Strackx, R. / De Groef, W. / Piessens, F. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 17
-
Towards a C2I Platform for Combating the Cyber-ThreatKearney, Paul et al. | 2012
- 17
-
Towards a C^2I Platform for Combating the Cyber-Threat (Extended Abstract)Kearney, P. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 20
-
Veracity, Plausibility, and ReputationGollmann, D. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 29
-
Another Fallen Hash-Based RFID Authentication ProtocolHernandez-Castro, J.C. / Peris-Lopez, P. / Safkhani, M. / Bagheri, N. / Naderi, M. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 38
-
HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural NetworkVenkatesh, G.K. / Nadarajan, R.A. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 49
-
How to Break EAP-MD5Liu, F. / Xie, T. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 58
-
Privacy Preserving Social Network Publication on Bipartite GraphsZhou, J. / Jing, J. / Xiang, J. / Wang, L. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 71
-
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing ApplicationsChristin, D. / Lopez, P.S. / Reinhardt, A. / Hollick, M. / Kauer, M. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 87
-
Privacy Preservation of User History GraphKiyomoto, S. / Fukushima, K. / Miyake, Y. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 97
-
HiPoLDS: A Security Policy Language for Distributed SystemsDell Amico, M. / Serme, G. / Idrees, M.S. / de Olivera, A.S. / Roudier, Y. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 113
-
ROAC: A Role-Oriented Access Control ModelNassr, N. / Steegmans, E. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 128
-
Optimal Parameters for Efficient Two-Party Computation ProtocolsGanesh, C. / Rangan, C.P. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 144
-
Assisting Server for Secure Multi-Party ComputationBohli, J.-M. / Li, W. / Seedorf, J. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 160
-
An Efficient Lattice-Based Secret Sharing ConstructionEl Bansarkhani, R. / Meziani, M. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 169
-
On the Optimality of Correlation Power Attack on Embedded Cryptographic SystemsSouissi, Y. / Debande, N. / Mekki, S. / Guilley, S. / Maalaoui, A. / Danger, J.-L. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 179
-
Impossible Differential Cryptanalysis of Reduced-Round LBlockKarakoc, F. / Demirci, H. / Harmanci, A.E. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 189
-
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile DevicesGrossschadl, J. / Page, D. / Tillich, S. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012
- 208
-
Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for AndroidSchreckling, D. / Posegga, J. / Kostler, J. / Schaff, M. / International Federation for Information Processing / IFIP WG 11.2 et al. | 2012