On Privacy Models for RFID
- 1 January 2007
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 20 references indexed in Scilit:
- $\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor CipherPublished by Springer Science and Business Media LLC ,2007
- On the Fly Authentication and Signature Schemes Based on Groups of Unknown OrderJournal of Cryptology, 2006
- Reducing Time Complexity in RFID SystemsLecture Notes in Computer Science, 2006
- Low-Cost Cryptography for Privacy in RFID SystemsLecture Notes in Computer Science, 2006
- A Case Against Currently Used Hash Functions in RFID ProtocolsLecture Notes in Computer Science, 2006
- RFID Traceability: A Multilayer ProblemLecture Notes in Computer Science, 2005
- Active attack against HB+: a provably secure lightweight authentication protocolElectronics Letters, 2005
- Public Key Authentication with One (Online) Single AdditionLecture Notes in Computer Science, 2004
- Strong Authentication for RFID Systems Using the AES AlgorithmPublished by Springer Science and Business Media LLC ,2004
- New directions in cryptographyIEEE Transactions on Information Theory, 1976