×

Found 178 Documents (Results 1–100)

100
MathJax

Multi-attribute counterfeiting tag identification protocol in large-scale RFID system. (English) Zbl 1452.94100

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 352-362 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Formal analysis of distance bounding with secure hardware. (English) Zbl 1440.94097

Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 579-597 (2018).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

Two mutual authentication protocols based on zero-knowledge proofs for RFID systems. (English) Zbl 06889992

Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 267-283 (2018).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Classification statistics in RFID systems. (English) Zbl 1474.62252

Gao, Xiaofeng (ed.) et al., Combinatorial optimization and applications. 11th international conference, COCOA 2017, Shanghai, China, December 16–18, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10628, 425-440 (2017).
MSC:  62H30 68T10
PDF BibTeX XML Cite
Full Text: DOI

Distributed computer and communication networks. 20th international conference, DCCN 2017, Moscow, Russia, September 25–29, 2017. Proceedings. (English) Zbl 1393.68018

Communications in Computer and Information Science 700. Cham: Springer (ISBN 978-3-319-66835-2/pbk; 978-3-319-66836-9/ebook). xiv, 478 p. (2017).
PDF BibTeX XML Cite
Full Text: DOI

Efficient tag path authentication protocol with less tag memory. (English) Zbl 1403.94100

Bao, Feng (ed.) et al., Information security practice and experience. 12th international conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-49150-9/pbk; 978-3-319-49151-6/ebook). Lecture Notes in Computer Science 10060, 255-270 (2016).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI Link

Performance analysis of tag identification time in passive RFID systems. (English) Zbl 1409.90035

Proceedings of the 11th international conference on queueing theory and network applications, QTNA 2016, Wellington, New Zealand, December 13–15, 2016. New York, NY: Association for Computing Machinery (ACM). Paper No. 25, 4 p. (2016).
MSC:  90B06 65K05
PDF BibTeX XML Cite
Full Text: DOI

Efficient public-key distance bounding protocol. (English) Zbl 1407.94129

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 873-901 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

The Simeck family of lightweight block ciphers. (English) Zbl 1380.94132

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 307-329 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Weaknesses in two RFID authentication protocols. (English) Zbl 1441.94097

El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 162-172 (2015).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

A provably secure offline RFID yoking-proof protocol with anonymity. (English) Zbl 1382.94144

Eisenbarth, Thomas (ed.) et al., Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). Lecture Notes in Computer Science 8898, 155-167 (2015).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

SAT representation of randomly deployed wireless sensor networks. (English) Zbl 1372.68204

Kovács, Emőd (ed.) et al., Proceedings of the 9th international conference on applied informatics (ICAI 2014), Eger, Hungary, January 29 – February 1, 2014. Volume 2. Eger: Eszterhazy Karoly University of Applied Sciences (ISBN 978-615-5297-19-9). 101-111 (2014).
MSC:  68R10 68M10 68M15
PDF BibTeX XML Cite
Full Text: DOI

A practical attack on patched MIFARE Classic. (English) Zbl 1347.94028

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 150-164 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

A provable secure batch authentication scheme for EPCGen2 tags. (English) Zbl 1368.94143

Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 103-116 (2014).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

Improved linear cryptanalysis of reduced-round MIBS. (English) Zbl 1417.94041

Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 204-220 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

On the security proof of an authentication protocol from Eurocrypt 2011. (English) Zbl 1417.94094

Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 187-203 (2014).
MSC:  94A62 68M12
PDF BibTeX XML Cite
Full Text: DOI

Application of RFID-technology to the problem of traffic control through roadway intersections. (English) Zbl 1298.90024

Vishnevsky, Vladimir (ed.) et al., Distributed computer and communication networks. 17th international conference, DCCN 2013, Moscow, Russia, October 7–10, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-05208-3/pbk; 978-3-319-05209-0/ebook). Communications in Computer and Information Science 279, 256-266 (2014).
MSC:  90B20
PDF BibTeX XML Cite

New generation of safety systems for automobile traffic control using RFID technology and broadband wireless communication. (English) Zbl 1298.90012

Vishnevsky, Vladimir (ed.) et al., Distributed computer and communication networks. 17th international conference, DCCN 2013, Moscow, Russia, October 7–10, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-05208-3/pbk; 978-3-319-05209-0/ebook). Communications in Computer and Information Science 279, 145-153 (2014).
PDF BibTeX XML Cite

Strong security and privacy of RFID system for internet of things infrastructure. (English) Zbl 1355.68023

Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 56-69 (2013).
PDF BibTeX XML Cite
Full Text: DOI

Never trust a bunny. (English) Zbl 1337.94093

Hoepman, Jaap-Henk (ed.) et al., Radio frequency identification. Security and privacy issues. 8th international workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2–3, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36139-5/pbk). Lecture Notes in Computer Science 7739, 137-148 (2013).
MSC:  94A62
PDF BibTeX XML Cite
Full Text: DOI

Pushing the limits of SHA-3 hardware implementations to fit on RFID. (English) Zbl 1353.94068

Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 126-141 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

An efficient and private RFID authentication protocol supporting ownership transfer. (English) Zbl 1412.94183

Avoine, Gildas (ed.) et al., Lightweight cryptography for security and privacy. Second international workshop, LightSec 2013, Gebze, Turkey, May 6–7, 2013. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8162, 130-141 (2013).
MSC:  94A60 68M12 68P25
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalytic attacks on MIFARE classic protocol. (English) Zbl 1312.94051

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 239-258 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Applying remote side-channel analysis attacks on a security-enabled NFC tag. (English) Zbl 1312.94065

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 207-222 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Compact hardware implementations of the block ciphers mCRYPTON, NOEKEON, and SEA. (English) Zbl 1295.94132

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 358-377 (2012).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Relations among notions of privacy for RFID authentication protocols. (English) Zbl 1404.94133

Foresti, Sara (ed.) et al., Computer security – ESORICS 2012. 17th European symposium on research in computer security, Pisa, Italy, September 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33166-4/pbk). Lecture Notes in Computer Science 7459, 661-678 (2012).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

Lapin: an efficient authentication protocol based on ring-LPN. (English) Zbl 1282.94078

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 346-365 (2012).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

Hierarchical ECC-based RFID authentication protocol. (English) Zbl 1436.94038

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 183-201 (2012).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI Link

A scalable RFID authentication protocol supporting ownership transfer and controlled delegation. (English) Zbl 1436.94060

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 147-162 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

BUPLE: securing passive RFID communication through physical layer enhancements. (English) Zbl 1436.94045

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 127-146 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

An automatic, time-based, secure pairing protocol for passive RFID. (English) Zbl 1436.94028

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 108-126 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

A novel RFID distance bounding protocol based on physically unclonable functions. (English) Zbl 1436.94072

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 78-93 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Side-channel analysis of cryptographic RFIDs with analog demodulation. (English) Zbl 1436.94073

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 61-77 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

A pre-computable signature scheme with efficient verification for RFID. (English) Zbl 1292.68052

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 1-16 (2012).
MSC:  68P25 94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Private identification of RFID tags. (English) Zbl 1302.94056

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 49-61 (2012).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Localization privacy. (English) Zbl 1300.94043

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 425-441 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

EPCBC – a block cipher suitable for electronic product code encryption. (English) Zbl 1307.94111

Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10–12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 76-97 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Addressing flaws in RFID authentication protocols. (English) Zbl 1291.94187

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 216-235 (2011).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

Passive cryptanalysis of the unconditionally secure authentication protocol for RFID systems. (English) Zbl 1297.94121

Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 92-103 (2011).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI arXiv Link

The LED block cipher. (English) Zbl 1291.94092

Preneel, Bart (ed.) et al., Cryptographic hardware and embedded systems – CHES 2011. 13th international workshop, Nara, Japan, September 28–October 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-23950-2/pbk). Lecture Notes in Computer Science 6917, 326-341 (2011).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol. (English) Zbl 1295.94188

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 427-442 (2011).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Year of Publication

all top 3

Classification

all top 3

Software