Leakage-Resilient RFID Authentication with Forward-Privacy (English)
- New search for: Matsuo, Shin’ichiro
- New search for: Phong, Le Trieu
- New search for: Ohkubo, Miyako
- New search for: Yung, Moti
- New search for: Matsuo, Shin’ichiro
- New search for: Phong, Le Trieu
- New search for: Ohkubo, Miyako
- New search for: Yung, Moti
In:
Radio Frequency Identification: Security and Privacy Issues
6
;
176-188
;
2010
- Article/Chapter (Book) / Electronic Resource
-
Title:Leakage-Resilient RFID Authentication with Forward-Privacy
-
Contributors:Matsuo, Shin’ichiro ( author ) / Phong, Le Trieu ( author ) / Ohkubo, Miyako ( author ) / Yung, Moti ( author )
-
Published in:Lecture Notes in Computer Science ; 6370, 6 ; 176-188
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2010-01-01
-
Size:13 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
The Physical Basis of RFID SecurityJuels, Ari et al. | 2010
- 2
-
Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage ModelSaxena, Nitesh / Voris, Jonathan et al. | 2010
- 22
-
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication ProtocolHernandez-Castro, Julio Cesar / Peris-Lopez, Pedro / Phan, Raphael C. -W. / Tapiador, Juan M. E. et al. | 2010
- 35
-
Practical NFC Peer-to-Peer Relay Attack Using Mobile PhonesFrancis, Lishoy / Hancke, Gerhard / Mayes, Keith / Markantonakis, Konstantinos et al. | 2010
- 50
-
Strong Authentication and Strong Integrity (SASI) Is Not That StrongAvoine, Gildas / Carpent, Xavier / Martin, Benjamin et al. | 2010
- 65
-
Privacy Models for RFID SchemesVaudenay, Serge et al. | 2010
- 66
-
On the Claimed Privacy of EC-RAC IIIFan, Junfeng / Hermans, Jens / Vercauteren, Frederik et al. | 2010
- 75
-
EC-RAC: Enriching a Capacious RFID Attack CollectionDeursen, Ton / Radomirović, Saša et al. | 2010
- 91
-
Anonymous RFID Authentication Using Trusted Computing TechnologiesDietrich, Kurt et al. | 2010
- 103
-
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-FriendlyAvoine, Gildas / Martin, Benjamin / Martin, Tania et al. | 2010
- 123
-
Hardware Intrinsic SecurityTuyls, Pim et al. | 2010
- 124
-
Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-CounterfeitingKerschbaum, Florian / Oertel, Nina et al. | 2010
- 138
-
Time Measurement Threatens Privacy-Friendly RFID Authentication ProtocolsAvoine, Gildas / Coisel, Iwen / Martin, Tania et al. | 2010
- 158
-
Anonymous Authentication for RFID SystemsArmknecht, Frederik / Chen, Liqun / Sadeghi, Ahmad-Reza / Wachsmann, Christian et al. | 2010
- 176
-
Leakage-Resilient RFID Authentication with Forward-PrivacyMatsuo, Shin’ichiro / Phong, Le Trieu / Ohkubo, Miyako / Yung, Moti et al. | 2010
- 189
-
An ECDSA Processor for RFID AuthenticationHutter, Michael / Feldhofer, Martin / Plos, Thomas et al. | 2010
- 203
-
Towards a Practical Solution to the RFID Desynchronization ProblemKoning Gans, Gerhard / Garcia, Flavio D. et al. | 2010
- 220
-
Optimal Security Limits of RFID Distance Bounding ProtocolsKara, Orhun / Kardaş, Süleyman / Bingöl, Muhammed Ali / Avoine, Gildas et al. | 2010
- 239
-
The Poulidor Distance-Bounding ProtocolTrujillo-Rasua, Rolando / Martin, Benjamin / Avoine, Gildas et al. | 2010
- 258
-
A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification ApplicationsKavun, Elif Bilge / Yalcin, Tolga et al. | 2010