Another Fallen Hash-Based RFID Authentication Protocol (English)
Free access
- New search for: Hernandez-Castro, Julio Cesar
- New search for: Peris-Lopez, Pedro
- New search for: Safkhani, Masoumeh
- New search for: Bagheri, Nasour
- New search for: Naderi, Majid
- New search for: Hernandez-Castro, Julio Cesar
- New search for: Peris-Lopez, Pedro
- New search for: Safkhani, Masoumeh
- New search for: Bagheri, Nasour
- New search for: Naderi, Majid
In:
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
2
;
29-37
;
2012
- Article/Chapter (Book) / Electronic Resource
-
Title:Another Fallen Hash-Based RFID Authentication Protocol
-
Contributors:Hernandez-Castro, Julio Cesar ( author ) / Peris-Lopez, Pedro ( author ) / Safkhani, Masoumeh ( author ) / Bagheri, Nasour ( author ) / Naderi, Majid ( author )
-
Published in:Lecture Notes in Computer Science ; 7322, 2 ; 29-37
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2012-01-01
-
Size:9 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Recent Developments in Low-Level Software SecurityAgten, Pieter / Nikiforakis, Nick / Strackx, Raoul / Groef, Willem / Piessens, Frank et al. | 2012
- 17
-
Towards a C2I Platform for Combating the Cyber-ThreatKearney, Paul et al. | 2012
- 20
-
Veracity, Plausibility, and ReputationGollmann, Dieter et al. | 2012
- 29
-
Another Fallen Hash-Based RFID Authentication ProtocolHernandez-Castro, Julio Cesar / Peris-Lopez, Pedro / Safkhani, Masoumeh / Bagheri, Nasour / Naderi, Majid et al. | 2012
- 38
-
HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural NetworkKirubavathi Venkatesh, G. / Anitha Nadarajan, R. et al. | 2012
- 49
-
How to Break EAP-MD5Liu, Fanbao / Xie, Tao et al. | 2012
- 58
-
Privacy Preserving Social Network Publication on Bipartite GraphsZhou, Jian / Jing, Jiwu / Xiang, Ji / Wang, Lei et al. | 2012
- 71
-
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing ApplicationsChristin, Delphine / Sánchez López, Pablo / Reinhardt, Andreas / Hollick, Matthias / Kauer, Michaela et al. | 2012
- 87
-
Privacy Preservation of User History GraphKiyomoto, Shinsaku / Fukushima, Kazuhide / Miyake, Yutaka et al. | 2012
- 97
-
HiPoLDS: A Security Policy Language for Distributed SystemsDell’Amico, Matteo / Serme, Gabriel / Idrees, Muhammad Sabir / Santana de Olivera, Anderson / Roudier, Yves et al. | 2012
- 113
-
ROAC: A Role-Oriented Access Control ModelNassr, Nezar / Steegmans, Eric et al. | 2012
- 128
-
Optimal Parameters for Efficient Two-Party Computation ProtocolsGanesh, Chaya / Pandu Rangan, C. et al. | 2012
- 144
-
Assisting Server for Secure Multi-Party ComputationBohli, Jens-Matthias / Li, Wenting / Seedorf, Jan et al. | 2012
- 160
-
An Efficient Lattice-Based Secret Sharing ConstructionBansarkhani, Rachid / Meziani, Mohammed et al. | 2012
- 169
-
On the Optimality of Correlation Power Attack on Embedded Cryptographic SystemsSouissi, Youssef / Debande, Nicolas / Mekki, Sami / Guilley, Sylvain / Maalaoui, Ali / Danger, Jean-Luc et al. | 2012
- 179
-
Impossible Differential Cryptanalysis of Reduced-Round LBlockKarakoç, Ferhat / Demirci, Hüseyin / Harmancı, A. Emre et al. | 2012
- 189
-
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile DevicesGroßschädl, Johann / Page, Dan / Tillich, Stefan et al. | 2012
- 208
-
Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for AndroidSchreckling, Daniel / Posegga, Joachim / Köstler, Johannes / Schaff, Matthias et al. | 2012