The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "RFIDSec"( http://dblp.L3S.de/Venues/RFIDSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/rfidsec

Publication years (Num. hits)
2010 (21) 2011-2012 (25) 2013-2014 (27) 2015-2016 (25) 2017 (1)
Publication types (Num. hits)
inproceedings(92) proceedings(7)
Venues (Conferences, Journals, ...)
RFIDSec(99)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 99 publication records. Showing 99 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Gerhard P. Hancke 0002, Konstantinos Markantonakis (eds.) Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers Search on Bibsonomy RFIDSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiong Li 0002, Jianwei Niu 0002, Kim-Kwang Raymond Choo A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Darren Hurley-Smith, Julio C. Hernandez-Castro Bias in the Mifare DESFire EV1 TRNG. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aysajan Abidin, Eduard Marin, Dave Singelée, Bart Preneel Towards Quantum Distance Bounding Protocols. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan LDA-Based Clustering as a Side-Channel Distinguisher. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Masoumeh Safkhani, Hoda Jannati, Nasour Bagheri Security Analysis of Niu et al. Authentication and Ownership Management Protocol. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hao Wang 0047, Guangjie Han, Chunsheng Zhu, Sammy Chan PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor Networks. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Siva Nishok Dhanuskodi, Daniel E. Holcomb Energy Optimization of Unrolled Block Ciphers Using Combinational Checkpointing. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Cox, David F. Oswald \upmu Proxy: A Hardware Relay for Anonymous and Secure Internet Access. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua Optimality Results on the Security of Lookup-Based Protocols. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qiao Hu, Gerhard P. Hancke 0002 Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yunhui Zhuang, Alvin Chung Man Leung, James Hughes Matching in Proximity Authentication and Mobile Payment EcoSystem: What Are We Missing? Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Danushka Jayasinghe, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes Enhancing EMV Tokenisation with Dynamic Transaction Tokens. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhe Liu 0001, Reza Azarderakhsh, Howon Kim 0001, Hwajeong Seo Efficient Implementation of Ring-LWE Encryption on High-End IoT Platform. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kun Yang, Domenic Forte, Mark M. Tehranipoor ReSC: RFID-Enabled Supply Chain Management and Traceability for Network Devices. Search on Bibsonomy RFIDSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Raghavan Kumar, Wayne P. Burleson Side-Channel Assisted Modeling Attacks on Feed-Forward Arbiter PUFs Using Silicon Data. Search on Bibsonomy RFIDSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1José Vila, Ricardo J. Rodríguez Practical Experiences on NFC Relay Attacks with Android - Virtual Pickpocketing Revisited. Search on Bibsonomy RFIDSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hannes Groß Sharing is Caring - On the Protection of Arithmetic Logic Units against Passive Physical Attacks. Search on Bibsonomy RFIDSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carlos Cid, Loïc Ferreira, Gordon Procter, Matthew J. B. Robshaw Algebraic Cryptanalysis and RFID Authentication. Search on Bibsonomy RFIDSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain Efficient and Secure Delegation of Group Exponentiation to a Single Server. Search on Bibsonomy RFIDSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson Security Evaluation and Enhancement of Bistable Ring PUFs. Search on Bibsonomy RFIDSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Johannes Tobisch, Georg T. Becker On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation. Search on Bibsonomy RFIDSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1René Habraken, Peter Dolron, Erik Poll, Joeri de Ruiter An RFID Skimming Gate Using Higher Harmonics. Search on Bibsonomy RFIDSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stefan Mangard, Patrick Schaumont (eds.) Radio Frequency Identification. Security and Privacy Issues - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers Search on Bibsonomy RFIDSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gesine Hinterwälder, Felix Riek, Christof Paar Efficient E-cash with Attributes on MULTOS Smartcards. Search on Bibsonomy RFIDSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Javad Alizadeh, Hoda AlKhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar 0002, Martin M. Lauridsen, Somitra Kumar Sanadhya Cryptanalysis of SIMON Variants with Connections. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rui Figueiredo, André Zúquete, Tomás Oliveira e Silva Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Luigi Sportiello ePassport: Side Channel in the Basic Access Control. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Jens Hermans, Jaap-Henk Hoepman, Anna Krasnova High-Speed Dating Privacy-Preserving Attribute Matching for RFID. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Krishna Chaitanya Pabbuleti, Deepak Hanamant Mane, Patrick Schaumont Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nan Li 0007, Yi Mu 0001, Willy Susilo, Fuchun Guo, Vijay Varadharajan Privacy-Preserving Authorized RFID Authentication Protocols. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Peter Pessl, Michael Hutter Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nitesh Saxena, Ahmad-Reza Sadeghi (eds.) Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xin Ye 0002, Cong Chen, Thomas Eisenbarth 0001 Non-Linear Collision Analysis. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Matthias Hamann, Vasily Mikhalev Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hannes Groß, Erich Wenger, Honorio Martín, Michael Hutter PIONEER - a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kostas Papapagiannopoulos High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Weiner, Salvador Manich, Georg Sigl A Low Area Probing Detector for Power Efficient Security ICs. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chitra Javali, Girish Revadigar, Lavy Libman, Sanjay Jha 0001 SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya Desynchronization and Traceability Attacks on RIPTA-DA Protocol. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Deepak Hanamant Mane, Patrick Schaumont Energy-Architecture Tuning for ECC-Based RFID Tags. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Muhammed Ali Bingöl, Xavier Carpent, Süleyman Kardas Deploying OSK on Low-Resource Mobile Devices. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalçin Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Erich Wenger, Thomas Korak, Mario Kirschbaum Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Hutter, Jörn-Marc Schmidt (eds.) Radio Frequency Identification - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shohreh Sharif Mansouri, Elena Dubrova An Improved Hardware Implementation of the Quark Hash Function. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Timo Kasper, Alexander Kühn, David F. Oswald, Christian T. Zenger, Christof Paar Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Luigi Sportiello, Andrea Ciardulli Long Distance Relay Attack. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jaap-Henk Hoepman, Ingrid Verbauwhede (eds.) Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mehmet Hilal Özcanhan, Gökhan Dalkiliç, Semih Utku Is NFC a Better Option Instead of EPC Gen-2 in Safe Medication of Inpatients. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya On the Security of Two RFID Mutual Authentication Protocols. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Konstantinos Papagiannopoulos, Aram Verstegen Speed and Size-Optimized Implementations of the PRESENT Cipher for Tiny AVR Devices. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Luigi Sportiello Weakening ePassports through Bad Implementations. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jens Hermans, Roel Peeters Private Yoking Proofs: Attacks, Models and New Provable Constructions. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ari Juels, Christof Paar (eds.) RFID. Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Xavier Carpent Yet Another Ultralightweight Authentication Protocol That Is Broken. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gergely Alpár, Lejla Batina, Wouter Lueks Designated Attribute-Based Proofs for RFID Applications. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hannes Groß, Thomas Plos On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Tanja Lange 0001 Never Trust a Bunny. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marek Klonowski, Krzysztof Majcher, Wojciech Macyna, Filip Zagórski Hidden Bits Approach for Authentication in RFID Systems. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel E. Holcomb, Amir Rahmati, Mastooreh Salajegheh, Wayne P. Burleson, Kevin Fu DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gesine Hinterwälder, Christof Paar, Wayne P. Burleson Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thijs Veugen, Michael Beye Improved Anonymity for Key-Trees. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Masoumeh Safkhani, Pedro Peris-Lopez, Nasour Bagheri, Majid Naderi, Julio César Hernández Castro On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christian Pendl, Markus Pelnar, Michael Hutter Elliptic Curve Cryptography on the WISP UHF RFID Tag. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede Hierarchical ECC-Based RFID Authentication Protocol. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva ROTIV: RFID Ownership Transfer with Issuer Verification. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Timo Kasper, David F. Oswald, Christof Paar Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1George T. Amariucai, Clifford Bergman, Yong Guan An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Cédric Hocquet, David Bol, François-Xavier Standaert, Francesco Regazzoni 0001, Israel Koren Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zheng Gong, Svetla Nikova, Yee Wei Law KLEIN: A New Family of Lightweight Block Ciphers. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohammad Reza Sohizadeh Abyaneh Security Analysis of Two Distance-Bounding Protocols. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Albert Fernàndez-Mir, Rolando Trujillo-Rasua, Jordi Castellà-Roca, Josep Domingo-Ferrer A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qi Chai, Guang Gong BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed Ali Bingöl, Hüseyin Demirci A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniel W. Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, Eric M. Smith The Hummingbird-2 Lightweight Authenticated Encryption Algorithm. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kurt Dietrich Anonymous RFID Authentication Using Trusted Computing Technologies. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nitesh Saxena, Jonathan Voris Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Xavier Carpent, Benjamin Martin 0002 Strong Authentication and Strong Integrity (SASI) Is Not That Strong. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum, Nina Oertel Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Benjamin Martin 0002, Tania Martin Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ton van Deursen, Sasa Radomirovic EC-RAC: Enriching a Capacious RFID Attack Collection. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rolando Trujillo-Rasua, Benjamin Martin 0002, Gildas Avoine The Poulidor Distance-Bounding Protocol. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Julio César Hernández Castro, Pedro Peris-Lopez, Raphael C.-W. Phan, Juan M. Estévez-Tapiador Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Iwen Coisel, Tania Martin Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shin'ichiro Matsuo, Le Trieu Phong, Miyako Ohkubo, Moti Yung Leakage-Resilient RFID Authentication with Forward-Privacy. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gerhard de Koning Gans, Flavio D. Garcia Towards a Practical Solution to the RFID Desynchronization Problem. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Orhun Kara, Süleyman Kardas, Muhammed Ali Bingöl, Gildas Avoine Optimal Security Limits of RFID Distance Bounding Protocols. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Liqun Chen 0002, Ahmad-Reza Sadeghi, Christian Wachsmann Anonymous Authentication for RFID Systems. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael Hutter, Martin Feldhofer, Thomas Plos An ECDSA Processor for RFID Authentication. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Junfeng Fan, Jens Hermans, Frederik Vercauteren On the Claimed Privacy of EC-RAC III. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Elif Bilge Kavun, Tolga Yalçin A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Serge Vaudenay Privacy Models for RFID Schemes. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lishoy Francis, Gerhard P. Hancke 0002, Keith Mayes, Konstantinos Markantonakis Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ari Juels The Physical Basis of RFID Security. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Siddika Berna Örs Yalçin (eds.) Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pim Tuyls Hardware Intrinsic Security. Search on Bibsonomy RFIDSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #99 of 99 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license