Information Security Group

RFID Security & Privacy Lounge

The RFID Security and Privacy Lounge references technical works related to security and privacy in RFID systems published in journals, conference proceedings, technical reports, thesis, eprints, and books. It is maintained by UCL's Information Security Group in Belgium, headed by Gildas Avoine.

A mailing list associated with the website monthly informs the registered members when an update is performed. The announcement may also contain some useful information like calls for papers related to RFID security and privacy. You can simply subscribe / unsubscribe to the mailing list, and submit a missing paper using the left-menu forms. More than 800 people are currently registered to the mailing list.

Articles

Download the full bibliography in bib or pdf.

Search




2014

  • Gökhan Dalkiliç, Mehmet Hilal Özcanhan And Hafize Şen Çakir.
    Increasing key space at little extra cost in RFID authentications.
    (Turkish Journal of Electrical Engineering & Computer Sciences, October 2014)
New
pdf bib
  • Lijun Gao, Maode Ma, Yantai Shu, Feng Lin, Lei Zhang And Yuhua Wei.
    A Low-Cost RFID Authentication Protocol Against Desynchronization with a Random Tuple.
    (Wireless Personal Communications, October 2014)
New
pdf bib
  • Hoda Jannati And Abolfaz Falahati.
    Achieving an appropriate security level for distance bounding protocols over a noisy channel.
    (Telecommunication Systems, October 2014)
New
pdf bib
  • Hamid Kashfi.
    Evaluation of Practical Attacks Against RFID Technology.
    (Master Thesis, October 2014)
New
pdf bib
  • Mohammad S.I. Mamun And Atsuko Miyaji.
    A privacy-preserving efficient RFID authentication protocol from SLPN assumption.
    (International Journal of Computational Science and Engineering, September 2014)No Keywords
bib
  • Abdulhadi Alqarni, Maali Alabdulhafith And Srinivas Sampalli.
    A Proposed RFID Authentication Protocol based on Two Stages of Authentication.
    (EUSPN-2014, September 2014)
pdf bib
  • Seyed Mohammad Alavi, Karim Baghery And Behzad Abdolmaleki.
    Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags.
    (Advances in Computer Science : an International Journal, September 2014)
New
pdf bib
  • Debiao He And Sherali Zeadally.
    An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography.
    (IEEE Internet of Things Journal, September 2014)No Keywords
New
pdf bib
  • Daisuke Moriyama.
    Provably secure two-round RFID grouping proof protocols.
    (RFID-TA 2014, September 2014)No Keywords
New
pdf bib
  • Jayagopal Narayanaswamy, Raghav Sampangi And Srinivas Sampalli.
    SCARS: Simplified cryptographic algorithm for RFID systems.
    (RFID-TA 2014, September 2014)No Keywords
New
pdf bib
  • Nidhi Chauhan.
    Vulnerability and Countermeasures of RFID System.
    (International Journal of Engineering and Technical Research, September 2014)
New
pdf bib
  • Debiao He, Neeraj Kumar, Naveen Chilamkurti And Jong-Hyouk Lee.
    Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol.
    (Journal of Medical Systems, August 2014)
pdf bib
  • Junyu Wang, Christian Floerkemeier And Sanjay E. Sarma.
    Session-based security enhancement of RFID systems for emerging open-loop applications.
    (Personal and Ubiquitous Computing, August 2014)
pdf bib
  • Lejla Batina, Jens Hermans, Jaap-Henk Hoepman And Anna Krasnova.
    High-speed dating -- Privacy-preserving attribute matching for RFID.
    (RFIDSec'14, July 2014)
pdf bib
  • Rui Figueiredo, André Zúquete And Tomás Oliveira Silva.
    Massively parallel identification of privacy-preserving vehicle RFID tags.
    (RFIDSec'14, July 2014)
pdf bib
  • Hannes Gross, Michael Hutter, Erich Wenger And Honorio Martin Gonzalez.
    PIONEER -- a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag.
    (RFIDSec'14, July 2014)
pdf bib
  • Chitra Javali, Girish Revadigar, Lavy Libman And Sanjay Jha.
    SeAK: Secure Authentication and Key Generation Protocol based on Dual Antennas for Wireless Body Area Networks.
    (RFIDSec'14, July 2014)
pdf bib
  • Abhishek Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Nasour Bagheri, Javad Alizadeh, Mohammad Reza Aref, Hoda A. Alkhzaimi And Martin M. Lauridsen.
    Cryptanalysis of SIMON Variants with Connections.
    (RFIDSec'14, July 2014)
pdf bib
  • Nan Li, Yi Mu, Willy Susilo, Fuchun Guo And Vijay Varadharajan.
    Privacy-preserving Authorized RFID Authentication Protocols.
    (RFIDSec'14, July 2014)
pdf bib
  • Krishna Pabbuleti, Deepak Mane And Patrick Schaumont.
    Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node.
    (RFIDSec'14, July 2014)
pdf bib
  • Kostas Papagiannopoulos.
    High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers.
    (RFIDSec'14, July 2014)
pdf bib
  • Luigi Sportiello.
    ePassport: Side Channel in the Basic Access Control.
    (RFIDSec'14, July 2014)
pdf bib
  • Peter Pessl And Michael Hutter.
    Curved Tags -- A Low-Resource ECDSA Implementation tailored for RFID Tags.
    (RFIDSec'14, July 2014)
pdf bib
  • Frederik Armknecht, Matthias Hamann And Vasily Mikhalev.
    Lightweight Authentication Protocols on Ultra-Lightweight RFIDs -- Myths and Facts.
    (RFIDSec'14, July 2014)
pdf bib
  • M. Raguramajayan, K. Sivasubramaniam, Y. Ananthi And S. Nagarajan.
    Location-Aware E-passport: Enhancing Security and Privacy.
    (International Journal of Applied Engineering Research, July 2014)
pdf bib
  • Yu-Chung Huang And Jehn-Ruey Jiang.
    Efficient Ultralightweight RFID Mutual Authentication.
    (iThings 2014, July 2014)
pdf bib
  • Michael Weiner, Salvador Manich And Georg Sigl.
    A Low Area Probing Detector for Power Efficient RFID Security ICs.
    (RFIDSec'14, July 2014)
pdf bib
  • Xin Ye, Cong Chen And Thomas Eisenbarth.
    Non-Linear Collision Analysis.
    (RFIDSec'14, July 2014)
pdf bib
  • Behzad Abdolmaleki, Karim Baghery, Bahareh Akhbari And Mohammad Reza Aref.
    Attacks and Improvements on Two New-Found RFID Authentication Protocols.
    (IST 2014, July 2014)No Keywords
pdf bib
  • Mohammad Sabzinejad Farash.
    Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography.
    (The Journal of Supercomputing, July 2014)
pdf bib
  • Xu Zhuang, Yan Zhun And Chin-Chen Chang.
    A New Ultralightweight RFID Protocol for Low-Cost Tags: R$^2$AP.
    (Wireless Personal Communications, July 2014)
pdf bib
  • M.F. Sadikin And M. Kyas.
    Security and privacy protocol for emerging smart RFID applications.
    (SNPD 2014, July 2014)No Keywords
pdf bib
  • Srujana Adepwar And P. Swetha.
    Security Solution for Real Time Location Systems Using Distance Bounding.
    (International Journal of Technology and Engineering Science, June 2014)
pdf bib
  • Mehmet Hilal Özcanhan, Gökhan Dalkiliç And Semih Utku.
    Cryptographically Supported NFC Tags in Medication for Better Inpatient Safety.
    (Journal of Medical Systems, June 2014)
New
pdf bib
  • Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu And Wanlei Zhou.
    Secure Tag Search in RFID Systems Using Mobile Readers.
    (IEEE Transactions on Dependable and Secure Computing, May 2014)No Keywords
pdf bib
  • Rolando Trujillo-Rasua, Benjamin Martin And Gildas Avoine.
    Distance-bounding facing both mafia and distance frauds.
    (IEEE Transactions on Wireless Communications, May 2014)
pdf bib
  • Taek-Young Youn And Dowon Hong.
    Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR.
    (IEICE Transactions on Communications, May 2014)No Keywords
pdf bib
  • Mohammad S.I. Mamun And Atsuko Miyaji.
    RFID Path Authentication, Revisited.
    (AINA-2014, May 2014)No Keywords
pdf bib
  • Mohammad S.I. Mamun And Atsuko Miyaji.
    A scalable secure RFID ownership transfer protocol for a large supply chain.
    (AINA-2014, May 2014)No Keywords
bib
  • Alex Arbit, Yoel Livne, Yossef Oren And Avishai Wool.
    Implementing public-key cryptography on passive RFID tags is practical.
    (International Journal of Information Security, April 2014)
pdf bib
  • Manju Lata And Adarsh Kumar.
    Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks.
    (IJCNIS, April 2014)
pdf bib
  • Aanjhan Ranganathan, Boris Danev And Srdjan Capkun.
    Low-Power Distance Bounding.
    (arXiv.org, Computer Science, Cryptography and Security, April 2014)
pdf bib
  • Zezhong Zhang And Qingqing Qi.
    An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography.
    (Journal of Medical Systems, April 2014)
pdf bib
  • Zhenguo Zhao.
    A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem.
    (Journal of Medical Systems, April 2014)
pdf bib
  • Abdoulaye Mbaye, Abdoul Aziz Ciss And Oumar Niang.
    A Lightweight Identification Protocol for Embedded Devices.
    (arXiv.org, Computer Science, Cryptography and Security, April 2014)
pdf bib
  • Pascal Uriena And Selwyn Piramuthu.
    Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks.
    (Decision Support Systems, March 2014)No Keywords
pdf bib
  • Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen And Hung-Min Sun.
    A Secure RFID Authentication Protocol Adopting Error Correction Code.
    (The Scientific World Journal, March 2014)
pdf bib
  • Jens Hermans, Roel Peeters And Bart Preneel.
    Proper RFID Privacy: Model and Protocols.
    (IEEE Transactions on Mobile Computing, March 2014)
pdf bib
  • Xiaofei Qian, Xinbao Liu, Shanlin Yang And Chao Zuo.
    Security and Privacy Analysis of Tree-LSHB+ Protocol.
    (Wireless Personal Communications, March 2014)
pdf bib
  • Xiuqing Chen, Tianjie Cao And Yu Guo.
    A New Scalable RFID Delegation Protocol.
    (Applied Mathematics and Information Sciences, February 2014)
pdf bib
  • Salekul Islam.
    Security analysis of LMAP using AVISPA.
    (International Journal of Security and Networks, February 2014)No Keywords
pdf bib
  • Mustapha Benssalah, Mustapha Djeddou And Karim Drouiche.
    Security enhancement of the authenticated RFID security mechanism based on chaotic maps.
    (Security and Communication Networks, January 2014)No Keywords
pdf bib
  • Qing Ling Cai, Yi Ju Zhan And Jian Yang.
    The Improvement of RFID Authentication Protocols Based on R-RAPSE.
    (Journal of Networks, January 2014)
pdf bib
  • Ben Niu, Xiaoyan Zhu, Haotian Chi And Hui Li.
    Privacy and Authentication Protocol for Mobile RFID Systems.
    (Wireless Personal Communications, January 2014)
pdf bib
  • Samad Rostampour, Mojtaba Eslamnezhad Namin And Mehdi Hosseinzadeh.
    A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security.
    (International Journal of Modern Education and Computer Science, January 2014)
pdf bib
  • Mohsen Shakiba, Mohammad Dakhilalian And Hamid Mala.
    Cryptanalysis of mCrypton-64.
    (International Journal of Communication Systems, January 2014)
pdf bib
  • Wei Xie, Lei Xie, Chen Zhang, Qiang Wang, Jian Xu, Quan Zhang And Chaojing Tang.
    RFID seeking: Finding a lost tag rather than only detecting its missing.
    (Journal of Network and Computer Applications, January 2014)
pdf bib
  • Sebastien Gambs, Cristina Onete And Jean-Marc Robert.
    Prover Anonymous and Deniable Distance-Bounding Authentication.
    (Cryptology ePrint Archive, Report 2014/114, 2014)
pdf bib
  • Jos Wetzels.
    Broken keys to the Kingdom Security and privacy aspects of RFID-based car keys.
    (arXiv.org, Computer Science, Cryptography and Security, 2014)
pdf bib
  • Paolo Palmieri, Luca Calderoni And Dario Maio.
    Spatial Bloom Filters: Enabling Privacy in Location-aware Applications.
    (Cryptology ePrint Archive, Report 2014/531, 2014)
pdf bib
  • Ka Ahmad Khoureich.
    hHB: a Harder HB+ Protocol.
    (Cryptology ePrint Archive, Report 2014/562, 2014)
pdf bib
  • Youjun Xu, Jialiang He, Jian Wang And Dongxing Wang.
    Enhance Patient Medication Safety With A RFID-based Authentication Scheme.
    (International Journal of u- and e-Service, Science and Technology, 2014)
pdf bib
  • Z. Liu, D. Liu, L. Li, H. Lin And Z. Yong.
    Implementation of A New RFID Authentication Protocol for EPC Gen2 Standard.
    (IEEE Sensors Journal, 2014)No Keywords
pdf bib
  • Khoureich Ahmad Ka.
    hHB: a Harder HB+s Protocol.
    (Cryptology ePrint Archive, Report 2014/562, 2014)
New
pdf bib
  • Adarsh Kumar And Krishna Gopal and Aggarwal Alok.
    A Novel Trusted Hierarchy Construction for RFID-Sensor Based MANETs Using ECC.
    (Electronics and Telecommunications Research Institute Journal, 2014)
New
pdf bib

2013

  • Tzipora Halevi, Haoyu Li, Di Ma, Nitesh Saxena, Jonathan Voris And Tuo Xiang.
    Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks.
    (IEEE Transactions on Emerging Topics in Computing, December 2013)
pdf bib
  • Sonam Devgan Kaul And Amit K. Awasthi.
    RFID Authentication Protocol to Enhance Patient Medication Safety.
    (Journal of Medical Systems, December 2013)
bib
  • Mahdi R. Alagheband And Mohammad R. Aref.
    Simulation-Based Traceability Analysis of RFID Authentication Protocols.
    (Wireless Personal Communications, December 2013)
bib
  • Jue-Sam Chou.
    An efficient mutual authentication RFID scheme based on elliptic curve cryptography.
    (The Journal of Supercomputing, December 2013)
pdf bib
  • Lishoy Francis, Gerhard Hancke And Keith Mayes.
    A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones.
    (International Journal of RFID Security and Cryptography, December 2013)
pdf bib
  • Hardy Lin, Yu-Kai Chen And Henry Ker-Chang Chang.
    A New EPC RFID Protocol Revised from Yeh et al. Protocol.
    (EECS 2013, December 2013)
pdf bib
  • Kalikinkar Mandal, Xinxin Fan And Guang Gong.
    Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Passive RFID Tags.
    (International Journal of RFID Security and Cryptography, December 2013)
pdf bib
  • Manjulata And Adarsh Kumar.
    Performance and probability analysis of Lightweight Identification Protocol.
    (ICSC 2013, December 2013)No Keywords
pdf bib
  • Jian Shen, Wenying Zheng, Jin Wang, Zhihua Xia And Zhangjie Fu.
    Study of the Privacy Models in RFID Authentication Protocols.
    (International Journal of Security and its Applications, December 2013)
pdf bib
  • Yang Xing-Chun, Xu Chun-Xiang, Mou Jian-Ping And Li Jian-Ping.
    An improved RFID tag ownership transfer scheme.
    (ICCWAMTIP 2013, December 2013)No Keywords
pdf bib
  • Jie Shi, Yingjiu Li, Robert H. Deng, Wei He And Eng Wah Lee.
    A Secure Platform for Information Sharing in EPCglobal Network.
    (International Journal of RFID Security and Cryptography, December 2013)
pdf bib
  • Ethmane El Moustaine.
    Authentication issues in low-cost RFID.
    (PhD thesis, December 2013)
pdf bib
  • Lijun Gao, Maode Ma, Yantai Shu And Yuhua Wei.
    An ultralightweight RFID authentication protocol with CRC and permutation.
    (Journal of Network and Computer Applications, November 2013)
bib
  • Michael Weiner, Maurice Massar, Erik Tews, Dennis Giese And Wolfgang Wieser.
    Security Analysis of a Widely Deployed Locking System.
    (ACM CCS'13, November 2013)
pdf bib
  • Gildas Avoine, Iwen Coisel And Tania Martin.
    Untraceability Model for RFID.
    (IEEE Transactions on Mobile Computing, November 2013)No Keywords
bib
  • Hoda Jannati And Abolfazl Falahati.
    Mutual Distance Bounding Protocol with Its Implementability Over a Noisy Channel and Its Utilization for Key Agreement in Peer-to-Peer Wireless Networks.
    (Wireless Personal Communications, November 2013)
bib
  • Jie Ling And Jinwei Shen.
    New defending ultra-lightweight RFID authentication protocol against DoS attacks.
    (CECNet 2013, November 2013)No Keywords
pdf bib
  • Ioana Cristina Boureanu, Aikaterini Mitrokotsa And Serge Vaudenay.
    Practical & Provably Secure Distance-Bounding.
    (ISC'13, November 2013)
pdf bib
  • Da-Zhi Sun And Zhen-Fu Cao.
    On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity.
    (Cryptologia, October 2013)No Keywords
bib
  • Masoumeh Safkhani, Pedro Peris-Lopez, Julio Cesar Hernandez-Castro And Nasour Bagheri.
    Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol.
    (Journal of Computational and Applied Mathematics, October 2013)
bib
  • Gildas Avoine, Muhammed Ali Bingöl, Xavier Carpent And Sıddıka Berna Örs Yalçın.
    Privacy-friendly Authentication in RFID Systems: On Sub-linear Protocols based on Symmetric-key Cryptography.
    (IEEE Transactions on Mobile Computing, October 2013)
pdf bib
  • Il-Soo Jeon And Eun-Jun Yoon.
    A New Ultra-lightweight RFID Authentication Protocol Using Merge and Separation Operations.
    (International Journal of Mathematical Analysis, October 2013)
bib
  • Saravanan Sundaresan, Robin Doss And Wanlei Zhou.
    Offline grouping proof protocol for RFID systems.
    (WiMob 2013, October 2013)No Keywords
pdf bib
  • Ehsan Vahedi.
    Security, Privacy and Efficiency in RFID Systems.
    (PhD thesis, September 2013)
pdf bib
  • Il-Soo Jeon And Eun-Jun Yoon.
    Cryptanalysis and Improvement of a New Ultra-lightweight RFID Authentication Protocol with Permutation.
    (Applied Mathematical Sciences, September 2013)
pdf bib
  • Mohammad Hassan Habibi And Mohammad Reza Aref.
    Attacks on Recent RFID Authentication Protocols.
    (Journal of Signal Processing Systems, September 2013)
pdf bib
  • Noureddine Chikouche, Foudil Cherif And Mohamed Benmohammed.
    Algebraic Replay Attacks on Authentication in RFID Protocols.
    (SecNet 2013, September 2013)
pdf bib
  • Jeddi Zahra, Amini Esmaeil And Bayoumi Magdy.
    A Novel Authenticated Encryption Algorithm for RFID Systems.
    (DSD 2013, September 2013)No Keywords
bib
  • Eren Kocaaǧa, Bünyamin Tanil, Muhammed Ali Bingöl And Süleyman Kardaş.
    Solution of a Conjecture: On 2-PCD RFID Distance Bounding Protocols.
    (ISC Turkey 2013, September 2013)
pdf bib
  • Zeeshan Bilal And Keith Martin.
    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures.
    (ARES 2013, September 2013)No Keywords
pdf bib
  • Pablo Picazo-Sanchez, Nasour Bagheri, Pedro Peris-Lopez And Juan Estevez Tapiador.
    Two RFID Standard-based Security Protocols for Healthcare Environments.
    (Journal of Medical Systems, August 2013)
pdf bib
  • Cheng-Chi Lee, Chi-Tung Chen, Chun-Ta Li And Ping-Hsien Wu.
    A practical RFID authentication mechanism for digital television.
    (Telecommunication Systems, August 2013)
pdf bib
  • Masoud Hadian Dehkordi And Yousof Farzaneh.
    Improvement of the Hash-Based RFID Mutual Authentication Protocol.
    (Wireless Personal Communications, August 2013)
pdf bib
  • Kai Bu, Xuan Liu And Bin Xiao.
    Approaching the time lower bound on cloned-tag identification for large RFID systems.
    (Ad Hoc Networks, August 2013)
pdf bib
  • Denis Trcek And Andrej Brodnik.
    Hard and soft security provisioning for computationally weak pervasive computing systems in e-Health.
    (Wireless Communications for e-Health Applications, August 2013)
bib
  • Xu Zhuang, Zhi-Hui Wang, Chin-Chen Chang And Yan Zhu.
    Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement.
    (Journal of Information Hiding and Multimedia Signal Processing, July 2013)
pdf bib
  • Mehmet Hilal Özcanhan, Gökhan Dalkiliç And Semih Utku.
    Is NFC a Better Option Instead of EPC Gen-2 in Safe Medication of Inpatients.
    (RFIDSec'13, July 2013)No Keywords
bib
  • Deepak Mane And Patrick Schaumont.
    Energy-Architecture Tuning for ECC-based RFID tags.
    (RFIDSec'13, July 2013)No Keywords
bib
  • Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede And Tolga Yalcin.
    Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures.
    (RFIDSec'13, July 2013)No Keywords
bib
  • Gildas Avoine, Muhammed Ali Bingol, Xavier Carpent And Suleyman Kardas.
    Deploying OSK on Low-Resource Mobile Devices.
    (RFIDSec'13, July 2013)No Keywords
bib
  • Erich Wenger, Thomas Korak And Mario Kirschbaum.
    Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware.
    (RFIDSec'13, July 2013)No Keywords
bib
  • Konstantinos Papagiannopoulos And Aram Verstegen.
    Speed and Size Optimized Implementations of the PRESENT Cipher for Tiny AVR Devices.
    (RFIDSec'13, July 2013)No Keywords
bib
  • Shohreh Sharif Mansouri And Elena Dubrova.
    An Improved Hardware Implementation of the Quark Hash Function.
    (RFIDSec'13, July 2013)No Keywords
bib
  • Timo Kasper, Alexander Kühn, David Oswald, Christian Zenger And Christof Paar.
    Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing.
    (RFIDSec'13, July 2013)No Keywords
bib
  • Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani And Somitra Kumar Sanadhya.
    The Resistance to Intermittent Position Trace Attacks and Desynchronization Attacks (RIPTA-DA) Protocol Is Not RIPTA-DA.
    (RFIDSec'13, July 2013)No Keywords
bib
  • Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani And Somitra Kumar Sanadhya.
    On the Security of two RFID Mutual Authentication Protocols.
    (RFIDSec'13, July 2013)No Keywords
bib
  • Luigi Sportiello And Andrea Ciardulli.
    Long Distance Relay Attack.
    (RFIDSec'13, July 2013)No Keywords
bib
  • Luke Mirowski.
    Exposing Clone RFID Tags at the Reader.
    (TrustCom 2013, July 2013)
pdf bib
  • Rima Hussin Embrak Alakrut, Azman Samsudin And Alfin Syafalni.
    Provably Lightweight RFID Mutual Authentication Protocol.
    (International Journal of Security and Its Applications, July 2013)
pdf bib
  • Mohammed J. Hakeem, Kaamran Raahemifar And Gul N. Khan.
    A novel key management protocol for RFID systems.
    (IWCMC 2013, July 2013)No Keywords
pdf bib
  • Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani And Somitra Kumar Sanadhya.
    Desynchronization and Traceability Attacks on RIPTA-DA Protocol.
    (RFIDSec'13, July 2013)
pdf bib
  • Pekka Jäppinen And Mikko Lampi.
    Hardware Cost Measurement of Lightweight Security Protocols.
    (Wireless Personal Communications, July 2013)
pdf bib
  • Mohammad S.I. Mamun And Atsuko Miyaji.
    A fully-secure RFID authentication protocol from exact LPN.
    (TrustCom 2013, July 2013)No Keywords
pdf bib
  • Ferhat Karakoc, Huseyin Demirci And A. Emre Harmanci.
    Biclique cryptanalysis of LBlock and TWINE.
    (Information Processing Letters, June 2013)
pdf bib
  • Wiem Tounsi, Nora Cuppens-Boulahia, Joaquin Garcia-Alfaro, Yannick Chevalier And Frédéric Cuppens.
    KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems.
    (Journal of Network and Computer Applications, June 2013)
pdf bib
  • Pierre-Henri Thevenon And Olivier Savry.
    Implementation of a Countermeasure to Relay Attacks for Contactless HF Systems.
    (InTech, June 2013)
pdf bib
  • Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez And Juan Estevez Tapiador.
    Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP.
    (Security and Communication Networks, June 2013)No Keywords
pdf bib
  • Hung-Yu Chien.
    Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices .
    (Computer Networks, June 2013)
pdf bib
  • Kaleb Lee Leemaqz.
    Privacy of RFID Models and Protocols.
    (PhD thesis, June 2013)
pdf bib
  • Honorio Martin, Enrique San Millan, Pedro Peris-Lopez And Juan M. Estevez Tapiador.
    Efficient ASIC Implementation and Analysis of two EPC-C1G2 RFID Authentication Protocols.
    (IEEE Sensors Journal, June 2013)No Keywords
pdf bib
  • Azam Zavvari, Masoud Shakiba, Mohammad Tariqul Islam, Elankovan Sundararajan And Mandeep Jit Singh.
    Computational Cost Analysis on Securing RFID Protocols Conforming to EPC Class-1 Generation-2 Standard.
    (ICEEI 2013, June 2013)
pdf bib
  • Tania Martin.
    Privacy in RFID Systems.
    (PhD thesis, June 2013)
pdf bib
  • Mehmet Hilal Özcanhan, Gökhan Dalkiliç And Semih Utku.
    Analysis of two protocols using EPC Gen-2 tags for safe inpatient medication.
    (INISTA 2013, June 2013)No Keywords
New
pdf bib
  • Ioana Boureanu, Aikaterini Mitrokotsa And Serge Vaudenay.
    Secure and Lightweight Distance-Bounding.
    (LightSec 2013, May 2013)
pdf bib
  • Suleyman Kardas, Atakan Arslan, Serkan Celik And Albert Levi.
    An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer.
    (LightSec 2013, May 2013)No Keywords
bib
  • Daisuke Moriyama.
    Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol.
    (LightSec 2013, May 2013)No Keywords
bib
  • Kazuya Saka, Min-Te Sun, Wei-Shinn Ku, Ten H. Lai And Athanasios V. Vasilakos.
    Randomized Skip Lists-Based Private Authentication for Large-Scale RFID Systems.
    (Technical report, May 2013)
pdf bib
  • Hwajeong Seo, Yeoncheol Lee, Hyunjin Kim, Taehwan Park And Howon Kim.
    Binary and prime field multiplication for public key cryptography on embedded microprocessors.
    (Security and Communication Networks, May 2013)No Keywords
pdf bib
  • Isaac Agudo, Ruben Rios And Javier Lopez.
    A privacy-aware continuous authentication scheme for proximity-based access control.
    (Computers & Security, May 2013)
pdf bib
  • Pierre Dusart And Sinaly Traoré.
    Lightweight Authentication Protocol for Low-Cost RFID Tags.
    (WISTP 2013, May 2013)
pdf bib
  • Daisuke Moriyama, Miyako Ohkubo And Shinichiro Matsuo.
    A Forward Privacy Model for RFID Authentication Protocols.
    (WISTP 2013, May 2013)
pdf bib
  • Oren Yossef.
    Secure Hardware – Physical Attacks and Countermeasures.
    (PhD thesis, May 2013)
pdf bib
  • Kevin Bowers, Ari Juels, Ronald Rivest And Emily Shen.
    Drifting Keys: Impersonation Detection for Constrained Devices.
    (IEEE InfoCom 2013, April 2013)
pdf bib
  • Ethmane El Moustaine And Maryline Laurent.
    GPS+: a back-end coupons identification for low-cost RFID.
    (WiSec'13, April 2013)No Keywords
pdf bib
  • Marc Fischlin And Cristina Onete.
    Subtle kinks in distance-bounding: an analysis of prominent protocols.
    (WiSec'13, April 2013)No Keywords
pdf bib
  • Panagiotis Rizomiliotis And Stefanos Gritzalis.
    Revisiting lightweight authentication protocols based on hard learning problems.
    (WiSec'13, April 2013)No Keywords
pdf bib
  • Jue-Sam Chou.
    A constant-time identifying large-scale RFID tags using lines on a plane.
    (Transactions on Emerging Telecommunications Technologies, April 2013)No Keywords
pdf bib
  • Min Chen, Wen Luo, Zhen Mo, Shigang Chen And Yuguang Fang.
    An Efficient Tag Search Protocol in Large-Scale RFID Systems.
    (IEEE InfoCom 2013, April 2013)
pdf bib
  • Jens Hermans, Roel Peeters And Cristina Onete.
    Efficient, secure, private distance bounding without key updates.
    (WiSec'13, April 2013)No Keywords
pdf bib
  • Sana Tmar-Ben Hamida, Pierre-Henri Thevenon, Jean-Benoit Pierrot, Olivier Savry And Claude Castelluccia.
    Detecting relay attacks in RFID systems using physical layer characteristics.
    (WMNC 2013, April 2013)No Keywords
pdf bib
  • Markku-Juhani O. Saarinen.
    Related-key Attacks Against Full Hummingbird-2.
    (FSE'13, March 2013)
pdf bib
  • Yi-Pin Liao And Chih-Ming Hsiao.
    A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol.
    (Ad Hoc Networks, March 2013)
pdf bib
  • Joan Melia-Segui, Joaquin Garcia-Alfaro And Jordi Herrera-Joancomarti.
    J3Gen: A PRNG for Low-Cost Passive RFID.
    (Sensors, March 2013)
pdf bib
  • Masoumeh Safkhani, Nasour Bagheri And Majid Naderi.
    Strengthening the Security of EPC C-1 G-2 RFID Standard.
    (Wireless Personal Communications, March 2013)
pdf bib
  • Hisham Khalaf Allahem.
    MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS.
    (Master Thesis, March 2013)
pdf bib
  • Gerhard de Koning Gans.
    Outsmarting Smart Cards.
    (PhD thesis, March 2013)
pdf bib
  • Chi-En Yin, Gang Qu And Qiang Zhou.
    Design and implementation of a group-based RO PUF.
    (DATE, March 2013)No Keywords
pdf bib
  • Liaojun Pang, Huixian Li, Liwei He, Ali Alramadhan And Yumin Wang.
    Secure and efficient lightweight RFID authentication protocol based on fast tag indexing.
    (International Journal of Communication Systems, March 2013)No Keywords
pdf bib
  • Miaolei Deng And Weijun Zhu.
    Desynchronization Attacks on RFID Security Protocols.
    (Telkomnika Indonesian Journal of Electrical Engineering, February 2013)No Keywords
pdf bib
  • Robin Doss, Zhou Wanlei And Yu Shui.
    Secure RFID Tag Ownership Transfer Based on Quadratic Residues.
    (IEEE Transactions on Information Forensics and Security, February 2013)No Keywords
pdf bib
  • Jovan Dj. Golić.
    Cryptanalytic Attacks on MIFARE Classic Protocol.
    (CT-RSA 2013, February 2013)No Keywords
pdf bib
  • Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez And Juan M. E. Tapiador.
    Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6".
    (Communications Letters, IEEE, February 2013)No Keywords
pdf bib
  • Michael Roland, Josef Langer And Josef Scharinger.
    Applying relay attacks to Google Wallet .
    (Near Field Communication (NFC), 2013 5th International Workshop on, February 2013)No Keywords
pdf bib
  • Ioana Cristina Boureanu, Aikaterini Mitrokotsa And Serge Vaudenay.
    Towards Secure Distance Bounding.
    (20th International Workshop, {FSE} 2013, February 2013)
pdf bib
  • Ioana Boureanu, Aikaterini Mitrokotsa And Serge Vaudenay.
    On the Need for Provably Secure Distance Bounding.
    (Early Symmetric Crypto (ESC) seminar, January 2013)
pdf bib
  • Myung-Ho Park, Ki-Gon Nam, Jin Seok Kim, Dae Hyun Yum And Pil Joong Lee.
    Unilateral Distance Bounding Protocol with Bidirectional Challenges.
    (IEICE Transactions on Information and Systems, January 2013)No Keywords
pdf bib
  • Chih-Ta Yen, Ming-Huang Guo, Nai-Wei Lo And Der-Jiunn Deng.
    Authentication with low-cost RFID tags in mobile networks.
    (Security and Communication Networks, January 2013)No Keywords
pdf bib
  • Qing Xuan Jia, Xin Wang, Xin Gao, Pan Pan Gao And Bing Zhao.
    An Effective Ultralightweight RFID Secure Protocol with Mutual Authentication.
    (Applied Mechanics and Materials, January 2013)No Keywords
pdf bib
  • Guanyang Deng, Hui Li, Ying Zhang And Jun Wang.
    Tree-LSHB+: An LPN-Based Lightweight Mutual Authentication RFID Protocol.
    (Wireless Personal Communications, January 2013)
pdf bib
  • P. Prabhusundhar, V. K. Narendira Kumar And B. Srinivasan.
    Border crossing security and privacy in biometric passport using cryptographic authentication protocol.
    (2013, January 2013)No Keywords
pdf bib
  • Ziyi Lin And Joo Seok Song.
    An Improvement in HB-Family Lightweight Authentication Protocols for Practical Use of RFID System.
    (jacn, January 2013)
pdf bib
  • Pablo Picazo-Sanchez, Lara Ortiz-Martin, Pedro Peris-Lopez And Julio Cesar Hernandez-Castro.
    Cryptanalysis of the RNTS system.
    (The Journal of Supercomputing, January 2013)
pdf bib
  • Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri And Majid Naderi.
    RFID in eHealth: How Combat Medications Errors and Strengthen Patient Safety.
    (Journal of Medical and Biological Engineering, January 2013)
pdf bib
  • Iwen Coisel And Tania Martin.
    Untangling RFID Privacy Models.
    (Journal of Computer Networks and Communications, 2013)
pdf bib
  • Amin Mohammadali, Zahra Ahmadian And Mohammad Reza Aref.
    Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard.
    (Cryptology ePrint Archive, Report 2013/066, 2013)
pdf bib
  • Pieter Westein And Wouter van Dullink.
    Relay attacks for RFID access controls..
    (Technical report, 2013)No Keywords
pdf bib
  • Hadi Ahmadi And Reihaneh Safavi-Naini.
    Secure Distance Bounding Verification using Physical-Channel Properties.
    (arXiv.org, Computer Science, Cryptography and Security, 2013)
pdf bib
  • Suleyman Kardas, Serkan Celik, Muhammed Ali Bingol And Albert Levi.
    A New Security and Privacy Framework for RFID In Cloud Computing.
    (Cryptology ePrint Archive, Report 2013/165, 2013)
pdf slides bib
  • Wei Xie, Chen Zhang, Quan Zhang And Chaojing Tang.
    RFID Authentication Against an Unsecure Backend Server.
    (arXiv.org, Computer Science, Cryptography and Security, 2013)
pdf bib
  • Roel Peeters And Jens Hermans.
    Attack on Liao and Hsiao’s Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol.
    (Cryptology ePrint Archive, Report 2013/399, 2013)
pdf bib
  • Hau Leung Harold Chung.
    Chaos Based RFID Authentication Protocol.
    (Master Thesis, 2013)
pdf bib
  • Nasour Bagheri And Masoumeh Safkhani.
    Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags.
    (Cryptology ePrint Archive, Report 2013/453, 2013)
pdf bib
  • Subhasish Dhal And Indranil Sengupta.
    Handling Authentication and Detection Probability in Multi-tag RFID Environment.
    (Cryptology ePrint Archive, Report 2013/486, 2013)
pdf bib
  • Valentina Banciu, Simon Hoerder And Dan Page.
    Lightweight primitive, feather-weight security ? A cryptanalytic knock-out. (Preliminary results).
    (Cryptology ePrint Archive, Report 2013/421, 2013)
pdf bib
  • Umar Mujahid, M. Najam-ul-islam, Jameel Ahmed And Usman Mujahid.
    Cryptanalysis of ultralightweight RFID authentication protocol.
    (Cryptology ePrint Archive, Report 2013/385, 2013)
pdf bib
  • Wang Shao-Hui, Xiao Fu, Chen Dan-wei And Wang Ru-chuan.
    Security Analysis of Lightweight Authentication Protocol from WISTP 2013.
    (Cryptology ePrint Archive, Report 2013/411, 2013)
pdf bib
  • Mete Akgün And M. Ufuk Çaǧlayan.
    On the Security of Recently Proposed RFID Protocols.
    (Cryptology ePrint Archive, Report 2013/820, 2013)
pdf bib
  • Mike Burmester And Jorge Munilla.
    Distributed Group Authentication for RFID Supply Management.
    (Cryptology ePrint Archive, Report 2013/779, 2013)
pdf bib
  • Aikaterini Mitrokotsa, Cristina Onete And Serge Vaudenay.
    Location Leakage in Distance Bounding: Why Location Privacy does not Work.
    (Cryptology ePrint Archive, Report 2013/776, 2013)
pdf bib
  • Raghuvir Songhela And Manik Lal Das.
    Wide-weak Privacy Preserving RFID Mutual Authentication Protocol.
    (Cryptology ePrint Archive, Report 2013/787, 2013)
pdf bib
  • Pedro Peris-Lopez, Juan Estevez Tapiador And Enrique San Millan.
    An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms.
    (IEEE Transactions on Industrial Informatics, 2013)No Keywords
bib
  • Lito Kriara, Matthew Alsup, Giorgio Corbellini, Matthew Trotter, Joshua Griffin And Stefan Mangold.
    RFID Shakables: Pairing Radio-Frequency Identification Tags with the Help of Gesture Recognition.
    (Proceedings of the ninth ACM conference on Emerging networking experiments and technologies, 2013)
pdf bib
  • Daisuke Moriyama, Shin’ichiro Matsuo And Moti Yung.
    PUF-Based RFID Authentication Secure and Private under Memory Leakage.
    (Cryptology ePrint Archive, Report 2013/712, 2013)
pdf bib

2012

  • Rima Belguechi And Patrick Rosenberger Lacharme Christophe.
    Enhancing the privacy of electronic passports.
    (International Journal of Information Technology and Management, December 2012)
bib
  • Mahdi R. Alagheband And Mohammad R. Aref.
    Unified privacy analysis of new-found RFID authentication protocols.
    (Security and Communication Networks, December 2012)No Keywords
pdf bib
  • Miao Lei Deng, Hao Jun Zhang And Wei Jun Zhu.
    Data Desynchronization Attacks on Two Lightweight Security Protocols for the RFID System.
    (Applied Mechanics and Materials, December 2012)No Keywords
pdf bib
  • Maria Cristina Onete.
    Security Aspects of Distance-Bounding Protocols.
    (PhD thesis, December 2012)
pdf bib
  • Khaled Ouafi And Serge Vaudenay.
    Strong Privacy for RFID Systems from Plaintext-Aware Encryption.
    (CANS 2012, December 2012)
pdf bib
  • Amandeep Singh Sran.
    RFID authentication scheme based on dynamic key generation.
    (Master Thesis, December 2012)
pdf bib
  • Kaleb Lee, Juan Gonzalez Nieto And Colin Boyd.
    A state-aware RFID privacy model with reader corruption.
    (CSS 2012, December 2012)No Keywords
pdf bib
  • Zhao Wang, Xu Zhigang, Wei Xin And Zhong Chen.
    Implementation and Analysis of a Practical NFC Relay Attack Example.
    (IMCCC 2012, December 2012)No Keywords
pdf bib
  • Noureddine Chikouche, Foudil Cherif And Mohamed Benmohammed.
    Vulnerabilities of two recently RFID authentication protocols.
    (ICCS 2012, November 2012)No Keywords
pdf bib
  • Aikaterini Mitrokotsa, Cristina Onete And Serge Vaudenay.
    Mafia Fraud Attack against the RC Distance-Bounding Protocol.
    (IEEE RFID TA 2012, November 2012)
pdf bib
  • Masoumeh Safkhani, Nasour Bagheri, Nasour Peris-Lopez And Aikaterini Mitrokotsa.
    On the Traceability of Tags in SUAP RFID Authentication Protocols.
    (IEEE RFID TA 2012, November 2012)
bib
  • Masoumeh Safkhani, Nasour Bagheri, Nasour Peris-Lopez, Aikaterini Mitrokotsa And Julio Cesar. Hernandez-Castro.
    Weaknesses in another Gen2-Based RFID Authentication Protocol.
    (IEEE RFID TA 2012, November 2012)
bib
  • Mohammad S.I. Mamun, Atsuko Miyaji And Mohammad S. Rahman.
    A Secure and Private RFID Authentication Protocol under SLPN Problem.
    (NSS 2012, November 2012)
pdf bib
  • Da-Zhi Sun And Ji-Dong Zhong.
    A hash-based RFID security protocol for strong privacy protection.
    (IEEE Transactions on Consumer Electronics, November 2012)
pdf bib
  • Monzur Morshed, Anthony Atkins And Hongnian Yu.
    Efficient mutual authentication protocol for radiofrequency identification systems.
    (Communications, Institution of Engineering and Technology, November 2012)
pdf bib
  • Nai-Wei Lo, Kuo-Hui Yeh And Hsuan-Yu Chen.
    Cryptanalyses of Two Ultralightweight RFID Authentication Protocols.
    (RFIDSec Asia'12, November 2012)No Keywords
bib
  • Gerhard P. Hancke.
    Distance-bounding for RFID: Effectiveness of terrorist fraud in the presence of bit errors.
    (RFID-TA 2012, November 2012)No Keywords
bib
  • Asli Bay, Ioana Cristina Boureanu, Aikaterini Mitrokotsa, Iosif-Daniel Spulber And Serge Vaudenay.
    The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks.
    (Inscrypt'12, November 2012)
bib
  • Ethmane El Moustaine And Maryline Laurent.
    A Lattice Based Authentication for Low-Cost RFID.
    (RFID-TA 2012, November 2012)
pdf bib
  • Jiwhan Lim, Sangjin Kim, Heekuck Oh And Donghyun Kim.
    A New Designated Query Protocol for Serverless Mobile RFID Systems with Reader and Tag Privacy.
    (Tsinghua Science and Technology, October 2012)No Keywords
pdf bib
  • Ioana Boureanu, Aikaterini Mitrokotsa And Serge Vaudenay.
    On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols.
    (LATINCRYPT 2012, October 2012)
pdf bib
  • Wang Shaohui, Liu Sujuan And Chen Danwei.
    Efficient Passive Full-disclosure Attack on RFID Light-weight Authentication Protocols LMAP++ and SUAP.
    (Telkomnika Indonesian Journal of Electrical Engineering, October 2012)No Keywords
pdf bib
  • Anjia Yang, Yunhui Zhuang And Duncan S. Wong.
    An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy.
    (ICICS'12, October 2012)
pdf bib
  • Daisuke Moriyama, Shin’ichiro Matsuo And Miyako Ohkubo.
    Relations among Notions of Privacy for RFID Authentication Protocols.
    (ESORICS 2012, September 2012)
pdf bib
  • Süleyman Kardaşa, Serkan Çelika, Muhammet Yıldıza And Albert Levi.
    PUF-enhanced offline RFID security and privacy.
    (Journal of Network and Computer Applications, September 2012)
pdf bib
  • David F. Barrero, Julio César Hernández-Castro, Pedro Peris-Lopez, David Camacho And Marı́a D. R-Moreno.
    A genetic tango attack against the David–Prasad RFID ultra-lightweight authentication protocol.
    (Expert Systems, September 2012)No Keywords
pdf bib
  • Mauw Sjouke And Selwyn Piramuthu.
    A PUF-based Authentication Protocol to Address Ticket-Switching of RFID-tagged Items.
    (STM 2012, September 2012)No Keywords
pdf bib
  • Tuan Anh Pham, Mohammad S. Hasan And Hongnian Yu.
    A RFID mutual authentication protocol based on AES algorithm.
    (CONTROL 2012, September 2012)
pdf bib
  • Michael Beye And Thijs Veugen.
    Anonymity for Key-Trees with Adaptive Adversaries.
    (SecureComm 2012, September 2012)
pdf bib
  • Julio Cesar Hernandez-Castro, Pedro Peris-Lopez And Jean-Philippe Aumasson.
    On the Key Schedule Strength of PRESENT.
    (SETOP 2012, September 2012)
pdf bib
  • Hoda Jannati And Abolfazl Falahati.
    Mutual implementation of predefined and random challenges over RFID distance bounding protocol.
    (ICISC 2012, September 2012)No Keywords
pdf bib
  • Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult And Milosch Meriac.
    Dismantling iClass and iClass Elite.
    (ESORICS 2012, September 2012)
pdf bib
  • Roel Verdult, Flavio Garcia And Josep Balasch.
    Gone in 360 Seconds: Hijacking with Hitag2.
    (USENIX'12, August 2012)
bib
  • Jans Hermans.
    Lightweight Public Key Cryptography.
    (PhD thesis, August 2012)
pdf bib
  • Z. Jeddi, E. Amini And M. Bayoumi.
    RBS: Redundant Bit Security Algorithm for RFID Systems.
    (ICCCN 2012, August 2012)
pdf bib
  • Xuefei Leng, Gerhard Hancke, Keith Mayes And Konstantinos Markantonakis.
    Tag Group Authentication Using Bit-Collisions.
    (ISSA 2012, August 2012)
pdf bib
  • Masoumeh Safkhani, Nasour Bagheri And Majid Naderi.
    On the Designing of a Tamper Resistant Prescription RFID Access Control System.
    (Journal Medical Systems, August 2012)
pdf bib
  • Tanvi Agrawal, P.K. Biswas And A.D. Raoot.
    An Optimized Query Tree Algorithm in RFID Inventory Tracking -- A case Study Evidence.
    (IJCSI International Journal of Computer Science Issues, July 2012)
pdf bib
  • Tian-Fu Lee, Hsin-Chang Chen And Pei-Wen Sun.
    An efficient RFID authentication scheme with privacy protection for multi-services.
    (BAI2012, July 2012)
pdf bib
  • Robin Doss, Saravanan Sundaresan And Wanlei Zhou.
    A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems.
    (Ad How Networks, July 2012)
pdf bib
  • Robin Doss, Wanlei Zhou, Saravanan Sundaresan, Shui Yu And Longxiang Gao.
    A minimum disclosure approach to authentication and privacy in RFID systems.
    (Computer Networks, July 2012)
pdf bib
  • Lijun Gao, Maode Ma, Yantai Shu And Yuhua Wei.
    A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems.
    (Wireless Personal Communications, July 2012)
pdf bib
  • Mahdi Azizi, Nasour Bagheri And Abdolrasol Mirgadri.
    Cryptanalysis of pasargad, a distance bounding protocol based on RFID system.
    (International Journal of UbiComp, July 2012)
pdf bib
  • Ya Liu, Dawu Gu, Bailan Li And Bo Qu.
    Legitimate-reader-only attack on MIFARE Classic.
    (Mathematical and Computer Modelling, July 2012)
pdf bib
  • Raghav Sampangi And Srini Sampalli.
    RBS: Redundant Bit Security Algorithm for RFID Systems.
    (CISDA 2012, July 2012)
pdf bib
  • Luigi Sportiello.
    Weakening ePassports through Bad Implementations.
    (RFIDSec'12, July 2012)
pdf bib
  • Gergely Alpar, Lejla Batina And Wouter Lueks.
    Designated Attribute-Based Proofs for RFID Applications.
    (RFIDSec'12, June 2012)
pdf bib
  • Kaoutar Elkhiyaoui, Erik-Oliver Blass And Refik Molva.
    T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags.
    (RFIDSec'12, June 2012)
pdf bib
  • Hannes Gross And Thomas Plos.
    On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller.
    (RFIDSec'12, June 2012)
pdf bib
  • Jens Hermans And Roel Peeters.
    Private yoking proofs: attacks, models and new provable constructions.
    (RFIDSec'12, June 2012)
pdf bib
  • Gesine Hinterwalder, Christof Paar And Wayne P. Burleson.
    Privacy Preserving Payments on Ultra-low Power Devices with Application in Intelligent Transportation Systems.
    (RFIDSec'12, June 2012)
pdf bib
  • Daniel Holcomb, Amir Rahmati, Mastooreh Salajegheh, Wayne Burleson And Kevin Fu.
    DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip Identification .
    (RFIDSec'12, June 2012)
pdf bib
  • Marek Klonowski, Krzysztof Majcher, Wojciech Macyna And Filip Zagorski.
    Hidden Bits Approach for Authentication in RFID Systems.
    (RFIDSec'12, June 2012)
pdf bib
  • Masoumeh Safkhani, Pedro Peris-Lopez, Nasour Badheri, Majid Naderi And Julio Cesar Hernandez- Castro.
    On the Security of Tan et al. Serverless RFID Authentication and Search Protocols.
    (RFIDSec'12, June 2012)
pdf bib
  • Shaoying Cai, Robert Deng, Yingjiu Li And Yunlei Zhao.
    A New Framework for Privacy of RFID Path Authentication.
    (ACNS 2012, June 2012)
pdf bib
  • Shaoying Cai, Yingjiu Li And Yunlei Zhao.
    Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains.
    (SEC 2012, June 2012)
pdf bib
  • Julio Cesar Hernandez-Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri And Majid Naderi.
    Another Fallen Hash-Based RFID Authentication Protocol.
    (WISTP'12, June 2012)
pdf bib
  • Behzad Malek And Ali Miri.
    Lightweight Mutual RFID Authentication.
    (ICC2012, June 2012)
pdf bib
  • Panagiotis Rizomiliotis And Stefanos Gritzalis.
    GHB#: A Provably Secure HB-Like Lightweight Authentication Protocol.
    (ACNS 2012, June 2012)
pdf bib
  • Behzad Malek And Ali Miri.
    Chaotic masking for securing RFID systems against relay attacks.
    (Security and Communication Networks, June 2012)No Keywords
pdf bib
  • Jing Huey Khor, Widad Ismail And Mohammad Ghulam Rahman.
    Prevention and Detection Methods for Enhancing Security in an RFID System.
    (International Journal of Distributed Sensor Networks, June 2012)
pdf bib
  • Gildas Avoine And Xavier Carpent.
    Yet Another Ultralightweight Authentication Protocol that is Broken.
    (RFIDSec'12, June 2012)
pdf bib
  • Daniel J. Bernstein And Tanja Lange.
    Never trust a bunny.
    (RFIDSec'12, June 2012)
pdf bib
  • Thijs Veugen And Michael Beye.
    Improved Anonymity for Key-trees.
    (RFIDSec'12, June 2012)
pdf bib
  • Rolando Trujillo-Rasua.
    Privacy in RFID and mobile objects.
    (PhD thesis, June 2012)
pdf bib
  • Abolfazl Falahati And Hoda Jannati.
    Application of distance bounding protocols with random challenges over RFID noisy communication systems.
    (WSS 2012, June 2012)No Keywords
pdf bib
  • Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Yiyuan Luo And Qi Chai.
    Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols.
    (International Journal of Information & Communication Technology Research, June 2012)No Keywords
bib
  • Eyad Abdullah Bogari, Pavol Zavarsky, Dale Lindskog And Ron Ruhl.
    An analysis of security weaknesses in the evolution of RFID enabled passport.
    (Internet Security (WorldCIS), 2012 World Congress on, June 2012)
pdf bib
  • Yung-Cheng Lee.
    Two Ultralightweight Authentication Protocols for Low-Cost RFID Tags.
    (Applied Mathematics and Information Sciences, May 2012)
pdf bib
  • Jitendra Gurubani, Harsh Thakkar And Dhiren Patel.
    Improvements over Extended LMAP+: RFID Authentication Protocol.
    (IFIPTM 2012, May 2012)
pdf bib
  • Yun Tian, Gongliang Chen And Jianhua Li.
    A New Ultralightweight RFID Authentication Protocol with Permutation.
    (IEEE Communications Letters, May 2012)
pdf bib
  • Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt And Srdjan Capkun.
    Distance Hijacking Attacks on Distance Bounding Protocols.
    (S&P '12, May 2012)
pdf bib
  • Mohammad Habibi And Mohammad Aref.
    Security and Privacy Analysis of Song-Mitchell RFID Authentication Protocol.
    (Wireless Personal Communications, May 2012)
pdf bib
  • Wei Zhou, Eun Jung Yoon And Selwyn Piramuthu.
    Simultaneous multi-level RFID tag ownership & transfer in health care environments.
    (Decision Support Systems, May 2012)
pdf bib
  • Kaoutar Elkhiyaoui, Erik-Oliver Blass And Refik Molva.
    CHECKER: on-site checking in RFID-based supply chains.
    (WiSec'12, April 2012)
pdf bib
  • Jin Seok Kim, Kookrae Cho, Dae Hyun Yum, Sung Je Hong And Pil Joong Lee.
    Lightweight Distance Bounding Protocol against Relay Attacks.
    (IEICE Transactions on Information and Systems, April 2012)No Keywords
pdf bib
  • Di Ma, Anudath K. Prasad, Nitesh Saxena And Tuo Xiang.
    Location-aware and safer cards: enhancing RFID security and privacy via location sensing.
    (WiSec'12, April 2012)
pdf bib
  • Jingxian Zhou, Yajian Zhou, Feng Xiao And Xinxin Niu.
    Mutual Authentication Protocol for Mobile RFID Systems.
    (Journal of Computational Information Systems, April 2012)
pdf bib
  • Gildas Avoine, Iwen Coisel And Tania Martin.
    A privacy-restoring mechanism for offline RFID systems.
    (WiSec'12, April 2012)
pdf slides bib
  • Christos Dimitrakakis, Aikaterini Mitrokotsa And Serge Vaudenay.
    Expected loss bounds for authentication in constrained channels.
    (IEEE InfoCom 2012, March 2012)
pdf bib
  • Ramzi Bassil, Wissam El-Beaino, Wassim Itani, Ayman Kayssi And Ali Chehab.
    PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol.
    (International Journal of RFID Security and Cryptography, March 2012)
pdf bib
  • Young Sil Lee, Tae Yong Kim And Hoon Jae Lee.
    Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting.
    (26nd International Conference on Advanced Information Networking and Applications - Workshops, 2012., March 2012)
pdf bib
  • Yoshikazu Hanatani, Miyako Ohkubo, Shin'ichiro Matsuo, Kazuo Sakiyama And Kazuo Ohta.
    A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication.
    (FC'12, March 2012)
pdf bib
  • M. B. Abdelhalim, M. El-Mahallawy, M. Ayyad And A. El-Mahallawy.
    Design and Implementation of an Encryption Algorithm for use in RFID System.
    (International Journal of RFID Security and Cryptography, March 2012)
pdf bib
  • Myo Min Aung, Yoon Seok Chang And Jong-un Won.
    Emerging RFID/USN Applications and Challenges.
    (International Journal of RFID Security and Cryptography, March 2012)
pdf bib
  • Kyusuk Han And Taeshik Shon.
    Sensor Authentication in Dynamic Wireless Sensor Network Environments.
    (International Journal of RFID Security and Cryptography, March 2012)
pdf bib
  • Hilal Houssain And Turki F. Al-Somani.
    Elliptic Curve Cryptoprocessor Implementation on a Nano FPGA: Interesting for Resource-Constrained Devices.
    (International Journal of RFID Security and Cryptography, March 2012)
pdf bib
  • Hilal Houssain, Mohamad Badra And Turki F. Al-Somani.
    Comparative Study of Elliptic Curve Cryptography Hardware Implementations in Wireless Sensor Networks.
    (International Journal of RFID Security and Cryptography, March 2012)
pdf bib
  • Nazish Irfan, Mustapha C. E. Yagoub And Khelifa Hettak.
    Efficient Approach for Redundant Reader Elimination for Directional Antenna in RFID Networks.
    (International Journal of RFID Security and Cryptography, March 2012)
pdf bib
  • Thomas Plos, Manfred Aigner, Thomas Baier, Martin Feldhofer, Michael Hutter, Thomas Korak And Erich Wenger.
    Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags.
    (International Journal of RFID Security and Cryptography, March 2012)
pdf bib
  • Mouza Bani Shemaili, Chan Yeob Yeun, Khalid Mubarak And Mohamed Jamal Zemerly.
    Security Threats and Challenges for RFID and WSN Integration.
    (International Journal of RFID Security and Cryptography, March 2012)
pdf bib
  • Qiang Yan, Yingjiu Li And Robert H. Deng.
    Anti-Tracking in RFID Discovery Service for Dynamic Supply Chain Systems.
    (International Journal of RFID Security and Cryptography, March 2012)
pdf bib
  • Jung Hee Cheon, Jeongdae Hong And Gene Tsudik.
    Reducing RFID Reader Load with the Meet-in-the-Middle Strategy.
    (Journal of Communications and Networks, February 2012)
pdf bib
  • Gildas Avoine, Xavier Carpent And Benjamin Martin.
    Privacy-friendly synchronized ultralightweight authentication protocols in the storm.
    (Journal of Network and Computer Applications, February 2012)
pdf bib
  • Khaled Ouafi.
    Security and Privacy in RFID Systems.
    (PhD thesis, February 2012)
pdf bib
  • Chao Lv, Hui Li, Jianfeng Ma And Ben Niu.
    Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
    (International Journal of Radio Frequency Identification Technology and Applications, January 2012)No Keywords
pdf bib
  • Qi Chai.
    Design and Analysis of Security Schemes for Low-cost RFID Systems.
    (PhD thesis, January 2012)
pdf bib
  • Chin-Ling Chen And Chih-Feng Chien.
    An Ownership Transfer Scheme Using Mobile RFIDs.
    (Wireless Personal Communications, January 2012)
pdf bib
  • Su Chunhua , Li Yingjiu, Zhao Yunlei, H. Deng Robert, Zhao Yiming And Zhou Jianying.
    A Survey on Privacy Frameworks for RFID Authentication.
    (IEICE Transactions on Information and Systems, January 2012)No Keywords
pdf bib
  • Muhammed Ali Bingol.
    Security analysis of RFID authentication protocols based on symmetric cryptography and implementation of a forward private scheme.
    (PhD thesis, January 2012)
pdf bib
  • Hung-Yu Chien, Chu-Sing Yang And Hung-Pin Hou.
    Non-linearity cannot help RFID resist full-disclosure attacks and terrorist fraud attacks.
    (Security and Communication Networks, 2012)No Keywords
pdf bib
  • Masoumeh Safkhani, Nasour Bagheri, Majid Naderi And Ali Mahani.
    How a Cryptographer Can Get Rich?.
    (Cryptology ePrint Archive, Report 2012/023, 2012)
pdf bib
  • Marc Fischlin And Cristina Onete.
    Provably Secure Distance-Bounding: an Analysis of Prominent Protocols.
    (Cryptology ePrint Archive, Report 2012/128, 2012)
pdf bib
  • Cristina Onete.
    Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy.
    (Cryptology ePrint Archive, Report 2012/165, 2012)
pdf bib
  • Fuchun Guo, Yi Mu, Willy Susilo And Vijay Varadharajan.
    A Pre-computable Signature Scheme with Efficient Verification for RFID.
    (Information Security Practice and Experience, 2012)
pdf bib
  • Xinchun Yin And Wang Li.
    LP0: A RFID Authentication Protocol for Low-cost Tags without Back-end Database.
    (CDCIEM 2012, 2012)No Keywords
pdf bib
  • Noureddine Chikouche, Foudil Cherif And Mohamed Benmohammed.
    An Authentication Protocol Based on Combined RFID-Biometric System.
    (International Journal of Advanced Computer Science and Applications, 2012)
pdf bib
  • Imran Erguler, Emin Anarim And Gokay Saldamli.
    Unbalanced states violates RFID privacy.
    (Journal of Intelligent Manufacturing, 2012)
pdf bib
  • Rolando Trujillo-Rasua, Agusti Solanas, Pablo A. Perez-Martinez And Josep Domingo-Ferrer.
    Predictive protocol for the scalable identification of RFID tags through collaborative readers.
    (Computers in Industry, 2012)
pdf bib
  • Daniel J. Bernstein And Tanja Lange.
    Never trust a bunny.
    (Cryptology ePrint Archive, Report 2012/355, 2012)
pdf bib
  • Markku-Juhani O. Saarinen And Daniel Engels.
    A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract).
    (Cryptology ePrint Archive, Report 2012/317, 2012)
pdf bib
  • Masoumeh Safkhani, Nasour Bagheri And Majid Naderi.
    On the Traceability of Tags in SUAP RFID Authentication Protocols.
    (Cryptology ePrint Archive, Report 2012/334, 2012)
pdf bib
  • Roel Peeters And Jens Hermans.
    Wide Strong Private RFID Identification based on Zero-Knowledge.
    (Cryptology ePrint Archive, Report 2012/389, 2012)
pdf bib
  • Masoumeh Safkhani, Nasour Bagheri, Majid Naderi And Ali Mahani.
    On the security of Lo et al.'s ownership transfer protocol.
    (Cryptology ePrint Archive, Report 2012/023, 2012)
pdf bib
  • Wang Shaohui, Sujuan Liu And Danwei Chen.
    Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy.
    (Cryptology ePrint Archive, Report 2012/391, 2012)
pdf bib
  • Zahra Ahmadian, Mahmoud Salmasizadeh And Mohammad Reza Aref.
    Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols.
    (Cryptology ePrint Archive, Report 2012/489, 2012)
pdf bib
  • Sangho Lee, Jin Seok Kim, Sung Je Hong And Jong Kim.
    Distance Bounding with Delayed Responses.
    (IEEE Commuication Letters, 2012)
pdf bib
  • Zahra Ahmadian, Mahmoud Salmasizadeh And Mohammad Reza Aref.
    Desynchronization Attack on RAPP Ultralightweight Authentication Protocol.
    (Cryptology ePrint Archive, Report 2012/490, 2012)
pdf bib
  • Ye Li And Fumio Teraoka.
    Privacy protection for low-cost RFID tags in IoT systems.
    (CFI 2012, 2012)No Keywords
pdf bib
  • Atsuko Miyaji And Mohammad Shahriar Rahman.
    KIMAP: Key-Insulated Mutual Authentication Protocol for RFID.
    (arXiv.org, Computer Science, Cryptography and Security, 2012)
pdf bib
  • Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez And Juan E. Tapiador.
    Cryptanalysis of RAPP, an RFID Authentication Protocol.
    (Cryptology ePrint Archive, Report 2012/702, 2012)
pdf bib

2011

  • Mohammad Habibi, Mohammad Aref And Di Ma.
    Addressing Flaws in RFID Authentication Protocols.
    (Indocrypt 2011, December 2011)
pdf bib
  • Yingjiu Li, Robert H. Deng, Junzuo Lai And Changshe Ma.
    On two RFID privacy notions and their relations.
    (TISSEC'11, December 2011)No Keywords
pdf bib
  • Di Ma And Nitesh Saxena.
    A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems.
    (Security and Communication Networks, December 2011)No Keywords
pdf bib
  • Wang Shaohui And Wei-wei Zhang.
    Passive Attack on RFID LMAP++ Authentication Protocol.
    (CANS 2011, December 2011)
pdf bib
  • Shu Cheng.
    Security and authentication schemes in RFID.
    (Master Thesis, December 2011)
pdf bib
  • Mathieu David.
    Lightweight Cryptography for Passive RFID Tags.
    (PhD thesis, December 2011)
pdf bib
  • Lijun Gao, Maode Ma, Yantai Shu And Chunfeng Liu.
    RFID security protocol trace attack and desynchronizing attack deep research.
    (ICCSNT 2011, December 2011)
pdf bib
  • Lijun Gao, Maode Ma, Yantai Shu And Chunfeng Liu.
    Design and analysis of a low cost multiple-secret-key RFID security protocol.
    (ICCSNT 2011, December 2011)
pdf bib
  • Bin Wang And Maode Ma.
    An untraceable and server-independent RFID authentication scheme.
    (ICICS 2011, December 2011)
pdf bib
  • Wei Zhou, Eun Jung Yoon And Selwyn Piramuthu.
    Hierarchical RFID Tag Ownership and Transfer in Supply Chains.
    (WEB 2011, December 2011)
pdf bib
  • Xinxin Fan, Guang Gong, Daniel W. Engels And Eric M. Smith.
    A lightweight privacy-preserving mutual authentication protocol for RFID systems.
    (IEEE GLOBECOM Workshops, December 2011)No Keywords
pdf bib
  • Long Hoang Nguyen.
    Rational distance-bounding protocols over noisy channels.
    (SIN 2011, November 2011)
pdf bib
  • Aras Eghdamian And Azman Samsudin.
    A Secure Protocol for Ultralightweight Radio Frequency Identification (RFID) Tags.
    (ICIEIS 2011, November 2011)
pdf bib
  • Wang Shaohui.
    Analysis and Design of RFID Tag Ownership Transfer Protocol.
    (ICCE 2011, November 2011)
pdf bib
  • Jean-Philippe Aumasson, Aikaterini Mitrokotsa And Pedro Peris-Lopez.
    A Note on a Privacy-Preserving Distance-Bounding Protocol.
    (ICICS'11, November 2011)
pdf bib
  • Mahdi Asadpour And Mohammad Torabi Dashti.
    A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets.
    (TrustCom 2011, November 2011)
pdf bib
  • Xiaolin Cao And Maire O'Neill.
    A Private and Scalable Authentication for RFID Systems Using Reasonable Storage.
    (TrustCom 2011, November 2011)No Keywords
pdf bib
  • Harinda Fernando And Jemal Abawajy.
    Mutual Authentication Protocol for Networked RFID Systems.
    (TrustCom 2011, November 2011)No Keywords
pdf bib
  • Keyvan Kashkouli Nejad, Xiaohong Jiang And Michitaka Kameyama.
    Non-blocking tag scanning for passive RFID localization.
    (ISDA 2011, November 2011)No Keywords
pdf bib
  • Huansheng Ning, Hong Liu And Chen Yang.
    Ultralightweight RFID Authentication Protocol Based on Random Partitions of Pseudorandom Identifier and Pre-shared Secret Value.
    (Chinese Journal of Electronics, October 2011)
pdf bib
  • Imran Erguler And Emin Anarim.
    Practical attacks and improvements to an efficient radio frequency identification authentication protocol.
    (Concurrency and Computation: Practice and Experience, October 2011)
pdf bib
  • Wei Xin, Tao Yang, Cong Tang, Jianbin Hu And Zhong Chen.
    A Distance Bounding Protocol Using Error State and Punishment.
    (IMCCC 2011, October 2011)No Keywords
pdf bib
  • Zheng Yuanqing And Li Mo.
    Fast tag searching protocol for large-scale RFID systems.
    (ICNP 2011, October 2011)
pdf bib
  • Wei Zhou, Eun Jung Yoon And Selwyn Piramuthu.
    Varying levels of RFID tag ownership in supply chains.
    (OTM 2011, October 2011)No Keywords
pdf bib
  • Ioannis Paparrizos, Stylianos Basagiannis And Sophia Petridou.
    Quantitative Analysis for Authentication of Low-cost RFID Tags.
    (LCN 2011, October 2011)
pdf bib
  • Jens Hermans, Andreas Pashalidis, Frederik Vercauteren And Bart Preneel.
    A New RFID Privacy Model.
    (ESORICS 2011, September 2011)
pdf bib
  • Nasour Bagheri, Masoumeh Safkhani, Somitra Kumar Sanadhya, Majid Naderi And Hamid Behnam.
    On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol.
    (DPM'11, September 2011)No Keywords
slides bib
  • Mohammad Hassan Habibi And Mahmud Gardeshi.
    Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard.
    (ICISC 2011, September 2011)
pdf bib
  • Young Sil Lee, YoungMi Park, SangHan Lee, TaeYong Kim And Hoon Jae Lee.
    RFID mutual authentication protocol with Unclonable RFID-tags.
    (ICMIC 2011, September 2011)
pdf bib
  • V. Ramachandra, M. Rahman And S. Sampalli.
    Lightweight matrix-based authentication protocol for RFID.
    (SoftCOM'11, September 2011)
pdf bib
  • Panagiotis Rizomiliotis, Evangelos Rekleitis And Stefanos Gritzalis.
    Designing secure RFID authentication protocols is (still) a non-trivial task.
    (NSS 2011, September 2011)
pdf bib
  • Qingsong Yao, Jinsong Han, Yong Qi, Lei Yang And Yunhao Liu.
    Privacy Leakage in Access Mode: Revisiting Private RFID Authentication Protocols.
    (ICPP 2011, September 2011)
pdf bib
  • Young-Sik Kim And Sang-Hyo Kim.
    RFID distance bounding protocol using m-ary challenges.
    (ICTC 2011, September 2011)
pdf bib
  • Mohamad Merhi, Julio Cesar Hernandez-Castro And Pedro Peris-Lopez.
    Studying the pseudo random number generator of a low-cost RFID tag.
    (RFID-TA 2011, September 2011)
pdf bib
  • Ton Frederik Petrus Van Deursen.
    Security of RFID protocols.
    (PhD thesis, September 2011)
pdf bib
  • Wolfgang Issovits And Michael Hutter.
    Weaknesses of the ISO/IEC 14443 Protocol Regarding Relay Attacks.
    (RFID-TA 2011, September 2011)
pdf bib
  • Yu-Jung Huang, Chi-Huan Jiang, Hsuan-Hsun Wu, Yi-Hao Hong And Kai-Jen Liu.
    Mutual Authentication Protocol for RFID System.
    (IEEE CSE 2011, August 2011)
pdf bib
  • Flavio D. Garcia, Gerhard de Koning Gans And Roel Verdult.
    Exposing iClass Key Diversification.
    (USENIX'11, August 2011)
pdf bib
  • Joan Melia-Segui, Joaquin Garcia-Alfaro And Jordi Herrera-Joancomarti.
    A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags.
    (Wireless Personal Communications, July 2011)
pdf bib
  • Hung-Min Sun, Shuai-Min Chen And King-Hang Wang.
    Cryptanalysis on the RFID ACTION Protocol.
    (SAM 2011, July 2011)
pdf bib
  • Honorio Martin, Enrique San Millan, Luis Entrena, Pedro Peris Lopez And Julio Cesar Hernandez- Castro.
    AKARI-X: A pseudorandom number generator for secure lightweight systems.
    (IOLTS 2011, July 2011)
pdf bib
  • Christian Pendl, Markus Pelnar and Michael Hutter.
    Elliptic Curve Cryptography on the WISP UHF RFID Tag.
    (RFIDSec'11, June 2011)
pdf bib
  • Qi Chai and Guang Gong.
    BUPLE: Securing Passive RFID Communication Through Physical Layer Enhancements.
    (RFIDSec'11, June 2011)
pdf bib
  • Suleyman Kardas, Mehmet Sabir Kiraz, Muhammed Ali Bingol and Huseyin Demirci.
    A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions.
    (RFIDSec'11, June 2011)
pdf bib
  • Zheng Gong, Svetla Nikova and Yee Wei Law.
    KLEIN: A New Family of Lightweight Block Ciphers.
    (RFIDSec'11, June 2011)
pdf bib
  • Lejla Batina, Stefaan Seys, Dave Singelee and Ingrid Verbauwhede.
    Hierarchical ECC-Based RFID Authentication Protocol.
    (RFIDSec'11, June 2011)
pdf bib
  • George T. Amariucai, Clifford Bergman and Yong Guan.
    An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID.
    (RFIDSec'11, June 2011)
pdf bib
  • David Oswald, Timo Kasper and Christof Paar.
    Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation.
    (RFIDSec'11, June 2011)
pdf bib
  • Daniel Engels, Markku-Juhani O. Saarinen and Eric M. Smith.
    The Hummingbird-2 Lightweight Authenticated Encryption Algorithm.
    (RFIDSec'11, June 2011)
pdf bib
  • Albert Fernandez-Mir, Rolando Trujillo-Rasua and Jordi Castella-Roca.
    Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.
    (RFIDSec'11, June 2011)
pdf bib
  • Mohammad Reza Sohizadeh Abyaneh.
    Security Analysis of two Distance-Bounding Protocols.
    (RFIDSec'11, June 2011)
pdf bib
  • Kaoutar Elkhiyaoui, Erik-Oliver Blass and Refik Molva.
    ROTIV: RFID Ownership Transfer with Issuer Verification.
    (RFIDSec'11, June 2011)
pdf bib
  • Alessandro Barenghi, Cédric Hocquet, David Bol, François-Xavier Standaert, Francesco Regazzoni and Israel Koren.
    Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-Threshold Devices through an example of a 65nm AES implementation.
    (RFIDSec'11, June 2011)
pdf bib
  • Gildas Avoine, Cedric Lauradoux And Benjamin Martin.
    How Secret-sharing can Defeat Terrorist Fraud.
    (WiSec'11, June 2011)
pdf slides bib
  • Guillermo Azuara And Jos Salazar.
    Comprehensive Protection of RFID Traceability Information Systems Using Aggregate Signatures.
    (Computational Intelligence in Security for Information Systems, June 2011)
pdf bib
  • Mohammad Habibi, Mahdi Alagheband And Mohammad Aref.
    Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard.
    (WISTP'11, June 2011)
pdf bib
  • Paolo D'Arco.
    An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control.
    (WISTP'11, June 2011)
pdf bib
  • Zbigniew Gobiewski, Krzysztof Majcher, Filip Zagrski And Marcin Zawada.
    Practical Attacks on HB and HB+ Protocols.
    (WISTP'11, June 2011)
pdf bib
  • Nazish Irfan, Mustapha Yagoub And Khelifa Hettak.
    Redundant Reader Elimination Approaches for RFID Networks.
    (Autonomous and Intelligent Systems, June 2011)
pdf bib
  • Mehrdad Kianersi, Mahmoud Gardeshi And Hamed Yousefi.
    Security Analysis of Ultra-lightweight Protocol for Low-Cost RFID Tags: SSL-MAP.
    (Recent Trends in Wireless and Mobile Networks, June 2011)
pdf bib
  • Herve Chabanne And Celine Chevalier.
    Vaudenay's Privacy Model in the Universal Composability Framework: A Case Study.
    (Secure and Trust Computing, Data Management, and Applications, June 2011)
pdf bib
  • H. Liu And H. Ning.
    Zero-Knowledge Authentication Protocol Based on Alternative Mode in RFID Systems.
    (IEEE Sensors Journal, June 2011)
pdf bib
  • Vaibhaw Dixit, Harsh Kumar Verma And Akhil Kumar Singh.
    Comparison of various Security Protocols in RFID.
    (International Journal of Computer Applications, June 2011)
pdf bib
  • Mete Akgun And Mehmet Caglayan.
    Extending an RFID Security and Privacy Model by Considering Forward Untraceability.
    (Security and Trust Management, June 2011)
pdf bib
  • Imran Erguler.
    Security and Privacy Analysis of Authentication Protocols in RFID Systems.
    (PhD thesis, June 2011)
pdf bib
  • Aisha Aseeri And Omaima Bamasak.
    HB-MP$^*$:Towards a Man-in-the-Middle-Resistant Protocol of HB Family.
    (1st International Conference on Wireless Communications and Mobile Computing, June 2011)No Keywords
bib
  • Chong Hee Kim and Gildas Avoine.
    RFID Distance Bounding Protocols with Mixed Challenges.
    (IEEE TWC, May 2011)
pdf bib
  • Behzad Malek.
    Light-Weight Authentication Schemes With Applications To RFID Systems.
    (PhD thesis, May 2011)
pdf bib
  • Shuai Shao, Guoai Xu And Yanfei Liu.
    Efficient RFID Authentication Scheme with High Security.
    (ICCSN 2011, May 2011)
pdf bib
  • Imran Erguler And Emin Anarim.
    Security flaws in a recent RFID delegation protocol.
    (Personal and Ubiquitous Computing, May 2011)
pdf bib
  • Marcin Poturalski, Manuel Flury, Panos Papadimitratos, Jean-Pierre Hubaux and Jean-Yves Le Boudec.
    Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures.
    (IEEE TWC, April 2011)
pdf bib
  • Nasour Bagheri, Masoumeh Safkhani, Majid Naderi and Somitra Kumar Sanadhya.
    Security Analysis of LMAP++, an RFID Authentication Protocol.
    (IACR ePrint, April 2011)
pdf bib
  • Julio C. Hernandez-Castro, Pedro Peris-Lopez, Juan M. E. Tapiador, Raphael C.-W. Phan and Tieyan Li.
    Passive Black-Box Cryptanalysis of an Ultralightweight Protocol after Eavesdropping One Authentication Session.
    (RFIDSec Asia'11, April 2011)No Keywords
bib
  • Bing Liu and Chao-Hsien Chu.
    A Fine-Grained Authentication Method for Inter-Domain EPCglobal Network.
    (RFIDSec Asia'11, April 2011)No Keywords
bib
  • Chunhua Su, Yingjiu Li and Robert H. Deng.
    RFID Mutual Authentication Protocols with Universally Composable Security.
    (RFIDSec Asia'11, April 2011)No Keywords
bib
  • Kevin Chiew, Yingjiu Li, Tieyan Li and Robert H. Deng.
    On False Authentications for C1G2 Passive RFID Tags.
    (RFIDSec Asia'11, April 2011)No Keywords
bib
  • Mohammad Hassan Habibi, Mahmud Gardeshi and Mahdi R. Alagheband.
    Attacks and Improvements to a New RFID Authentication Protocol.
    (RFIDSec Asia'11, April 2011)No Keywords
bib
  • Przemyslaw Blaskiewicz, Jacek Cichon, Miroslaw Kutylowski and Krzysztof Majcher.
    RFID Electronic Visa with Personalized Verification.
    (RFIDSec Asia'11, April 2011)No Keywords
bib
  • Yu Yao, Jiawei Huang, Sudhanshu Khanna, Abhi Shelat, Benton Highsmith Calhoun, John Lach and David Evans.
    A Sub-0.5V Lattice-Based Public-Key Encryption Scheme for RFID Platforms in 130nm CMOS.
    (RFIDSec Asia'11, April 2011)No Keywords
bib
  • Sandra Dominikus, Hannes Gross, Manfred Aigner and Stefan Kraxberger.
    Low-cost RFID Tags as IPv6 Nodes in the Internet of Things.
    (RFIDSec Asia'11, April 2011)No Keywords
bib
  • Wei Xin, Cong Tang, Hu Xiong, Yonggang Wang, Huiping Sun, Zhi Guan and Zhong Chen.
    MEED: A Memory-efficient Distance Bounding Protocol with Error Detection.
    (RFIDSec Asia'11, April 2011)No Keywords
bib
  • Yan-Chen Liu, Hung-Yu Chien, Yu-Chang Chen, Chu-Sing Yang and Nai-Wei Lo.
    Integrated EPC Information Service Authentication Using OpenID in Cross Domains.
    (RFIDSec Asia'11, April 2011)No Keywords
bib
  • Tzipora Halevi, Nitesh Saxena And Shai Halevi.
    Tree-based HB Protocols for Privacy-Preserving Authentication of RFID Tags.
    (Special Issue on RFID System Security, April 2011)
pdf bib
  • Dae Hyun Yum, Jin Seok Kim, Sung Je Hong And Pil Joong Lee.
    Distance Bounding Protocol with Adjustable False Acceptance Rate.
    (IEEE Commuication Letters, April 2011)
pdf bib
  • Cas Cremers, Kasper Bonne Rasmussen and Srdjan Capkun.
    Distance Hijacking Attacks on Distance Bounding Protocols.
    (IACR ePrint, March 2011)
pdf bib
  • Gildas Avoine, Muhammed Ali Bingol, Suleyman Kardas, Cédric Lauradoux and Benjamin Martin.
    A Framework for Analyzing RFID Distance Bounding Protocols.
    (JCS, March 2011)
pdf bib
  • Suleyman Kardas, Albert Levi and Ertugrul Murat.
    Providing Resistance against Server Information Leakage in RFID Systems.
    (NTMS'11, February 2011)
bib
  • Dae Hyun Yum, Jin Seok Kim, Sung Je Hong and Pil Joong Lee.
    Distance Bounding Protocol for Mutual Authentication.
    (IEEE TWC, February 2011)
pdf bib
  • Suleyman Kardas, Mehmet Sabir Kiraz, Muhammed Ali Bingol and Huseyin Demirci.
    A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions.
    (IACR ePrint, February 2011)
pdf bib
  • Aurélien Francillon, Boris Danev And Srdjan Čapkun.
    Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.
    (Network and Distributed System Security Symposium, February 2011)
pdf bib
  • Wang Shaohui.
    Security Flaws in Two RFID Lightweight Authentication Protocols.
    (Communication Systems and Information Technology, 2011)
pdf bib
  • Mike Burmester and Daniel Miller.
    Ad Hoc Subgroup Proofs for RFID.
    (Technical report, 2011)
pdf bib
  • Gaurav Kapoor and Selwyn Piramuthu.
    Single RFID Tag Ownership Transfer Protocols.
    (IEEE TSMC, 2011)
pdf bib
  • Imran Erguler, Emin Anarim and Gokay Saldamli.
    A Salient Missing Link in RFID Security Protocols.
    (EURASIP JWCN, 2011)
pdf bib
  • Mauro Conti, Roberto Di Pietro and Angelo Spognardi.
    "Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation.
    (EURASIP JWCN, 2011)
pdf bib
  • Mathieu David, Damith C. Ranasinghe And Torben Larsen.
    A2U2: A Stream Cipher for Printed Electronics RFID Tags.
    (IEEE RFID 2011, 2011)
pdf bib
  • Antonis Dimitriou, Aggelos Bletsas And Anastasis Polycarpou Sahalos John.
    Theoretical Findings and Measurements on Planning a UHF RFID System inside a Room.
    (Radioengineering, 2011)
pdf bib
  • Duerholz Ulrich, Fischlin Marc, Kasper Michael And Onete Cristina.
    A Formal Approach to Distance-Bounding RFID Protocols.
    (Cryptology ePrint Archive, Report 2011/321, 2011)
pdf bib
  • Lejla Batina, Yong Lee, Stefaan Seys, Dave Singele And Ingrid Verbauwhede.
    Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs.
    (Personal and Ubiquitous Computing, 2011)
pdf bib
  • Pedro Peris-Lopez, Agustin Orfila, Esther Palomar And Julio Hernandez-Castro.
    A secure distance-based RFID identification protocol with an off-line back-end database.
    (Personal and Ubiquitous Computing, 2011)
pdf bib
  • Ehsan Vahedi, Vahid Shah-Mansouri, Vincent W.S. Wong, Ian F. Blake And Rabab K. Ward.
    Probabilistic Analysis of Blocking Attack in RFID Systems.
    (IEEE Transactions on Information Forensics and Security, 2011)
pdf bib
  • Joaquin Garcia-Alfaro, Michel Barbeau And Evangelos Kranakis.
    Proactive Threshold Cryptosystem for EPC Tags.
    (Ad Hoc {&} Sensor Wireless Networks, 2011)
pdf bib
  • Dae Hyun Yum, Jin Seok Kim, Je Hong Sung And Pil Joong Lee.
    Probabilistic Analysis of Blocking Attack in RFID Systems.
    (IEEE Communications Letters, 2011)
pdf bib
  • Masoumeh Safkhani, Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Nasour Bagheri And Majid Naderi.
    Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.
    (Cryptology ePrint Archive, Report 2011/311, 2011)
pdf bib
  • Carl Bosley, Kristiyan Haralambiev And Antonio Nicolosi.
    HB N: An HB-like protocol secure against man-in-the-middle attacks.
    (Cryptology ePrint Archive, Report 2011/350, 2011)
pdf bib
  • Mohammad Hassan Habibi, Mahmoud Gardeshi And Mahdi R. Alaghband.
    Cryptanalysis of two mutual authentication protocols for low-cost RFID.
    (International Journal of Distributed and Parallel systems, 2011)
pdf bib
  • Ehsan Vahedi, Rabab Ward And Ian Blake.
    Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols.
    (Computational Intelligence in Security for Information Systems, 2011)
pdf bib
  • Mohammad Arjmand, Mahmoud Gardeshi, Reza Taheri zohur And Mohammad Kazemi.
    Providing a Distance Bounding Protocol Named Pasargad in order to Defend against Relay Attacks on RFID-Based Electronic Voting System.
    (International Journal of UbiComp, 2011)
pdf bib
  • Michael Beye And Thijs Veugen.
    Improved Anonymity for Key-Trees.
    (Cryptology ePrint Archive, Report 2011/395, 2011)
pdf bib
  • Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya And Majid Naderi.
    Cryptanalysis of improved Yeh et al. 's authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol.
    (Cryptology ePrint Archive, Report 2011/426, 2011)
pdf bib
  • Masoumeh Safkhani, Nasour Bagheri And Majid Naderi.
    Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol.
    (Cryptology ePrint Archive, Report 2011/424, 2011)
pdf bib
  • Gaurav Kapoor, Wei Zhou And Selwyn Piramuthu.
    Multi-tag and Multi-owner RFID Ownership Transfer in Supply Chains.
    (Decision Support Systems, 2011)
pdf bib
  • Huansheng Ning, Hong Liu, Laurence T. Yang And Yan Zhang.
    Dual cryptography authentication protocol and its security analysis for radio frequency identification systems.
    (Concurrency and Computation: Practice and Experience, 2011)
pdf bib
  • Basel Alomair, Andrew Clark, Jorge Cuellar And Radha Poovendran.
    Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.
    (IEEE Transactions on Parallel and Distributed Systems, 2011)
pdf bib
  • Mahdi Azizi And Nasour Bagheri.
    Cryptanalysis of Sulma, An Ultralightweight Mutual Authentication Protocol for Low-Cost RFID Tags.
    (International Journal of UbiComp, 2011)
pdf bib
  • Hung-yu Chien, Ming-kuei Yeh, Tzong-chen Wu And Chin-i Lee.
    Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups.
    (Journal of Shanghai Jiaotong University (Science), 2011)
pdf bib
  • Lishoy Francis, Gerhard Hancke, Keith Mayes And Konstantinos Markantonakis.
    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones.
    (Cryptology ePrint Archive, Report 2011/618, 2011)
pdf bib
  • Mohammad Hassan Habibi And Mohammad Reza Aref.
    Two RFID Privacy Models in Front of a Court.
    (Cryptology ePrint Archive, Report 2011/625, 2011)
pdf bib
  • Suleyman Kardas, Atakan Arslan, Serkan Celik And Albert Levi.
    An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer.
    (Cryptology ePrint Archive, Report 2011/667, 2011)
pdf bib
  • Masoumeh Safkhani, Nasour Bagheri, Somitra Sanadhya Kumar And Majid Naderi.
    Security Analysis of a PUF based RFID Authentication Protocol.
    (Cryptology ePrint Archive, Report 2011/704, 2011)
pdf bib
  • Mu'awya Naser, Pedro Peris-Lopez, Rahmat Budiarto And Benjamin Ramos Alvarez.
    A note on the security of PAP.
    (Computer Communications, 2011)
pdf bib
  • Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M.E. Tapiador And Jan C.A. van der Lubbe.
    Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.
    (Engineering Applications of Artificial Intelligence, 2011)
pdf bib
  • Yuan Tian, Biao Song And Eui-nam Huh.
    A novel Threat Evaluation method for privacy-aware system in RFID.
    (International Journal of Ad Hoc and Ubiquitous Computing, 2011)No Keywords
pdf bib
  • Pierre-Henri Thevenon, Olivier Savry, Smail Tedjini And Ricardo Malherbi-Martins.
    Current Trends and Challenges in RFID..
    (InTech, 2011)
pdf bib

2010

  • Firdous Kausar, Zeeshan Bilal, Senol Zafer Erdogan and Jongsung Kim.
    AGVUS Ultra-Lightweight Mutual Authentication Protocol for Low-cost RFID Tags.
    (ACSA'10, December 2010)
bib
  • Basel Alomair and Radha Poovendran.
    Efficient Authentication for Mobile and Pervasive Computing.
    (ICICS'10, December 2010)
pdf bib
  • Mohammad Reza Sohizadeh Abyaneh.
    Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems.
    (ICISC 2010, December 2010)
pdf bib
  • Dang Nguyen Duc, Kwangjo Kim and Chan Yeob Yeun.
    Reconsidering Ryu-Takagi RFID Authentication Protocol.
    (ICITST'10, November 2010)
pdf bib
  • Pedro Peris-Lopez, Enrique San Millan, Jan C.A. van der Lubbe and Luis A. Entrena.
    Cryptographically Secure Pseudo-Random Bit Generator for RFID Tags.
    (ICITST'10, November 2010)
pdf bib
  • Srdjan Capkun, Karim El Defrawy and Gene Tsudik.
    GDB: Group Distance Bounding Protocols.
    (arXiv, November 2010)
pdf bib
  • Yong Ki Lee, Lejla Batina, Dave Singelee, Bart Preneel and Ingrid Verbauwhede.
    Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware.
    (THIS 2010, November 2010)
pdf bib
  • Ahmad-Reza Sadeghi, Ivan Visconti and Christian Wachsmann.
    Enhancing RFID Security and Privacy by Physically Unclonable Functions.
    (THIS 2010, November 2010)
pdf bib
  • Pedro Peris-Lopez, Agustin Orfila, Aikaterini Mitrokotsa and Jan C. A. van der Lubbe.
    A Comprehensive RFID Solution to Enhance Inpatient Medication Safety..
    (IJMI, October 2010)
pdf bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Raphael C.-W. Phan, Juan M. E. Tapiador and Tieyan Li.
    Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
    (Inscrypt'10, October 2010)
pdf bib
  • Selwyn Piramuthu.
    RFID Mutual Authentication Protocols.
    (Elsevier DSS, October 2010)
pdf bib
  • Jose Carrijo, Rafael Tonicelli and Anderson C. A. Nascimento.
    A Fault Analytic Method against HB+.
    (IACR ePrint, October 2010)
pdf bib
  • Davide Zanetti, Boris Danev and Srdjan Capkun.
    Physical-layer Identification of UHF RFID Tags.
    (MobiCom'10, September 2010)
pdf bib
  • Ali Özhan Gürel, Atakan Arslan and Mete Akgün.
    Non-Uniform Stepping Approach to RFID Distance Bounding Problem.
    (DPM'10, September 2010)
slides bib
  • Robert H. Deng, Yingjiu Li, Moti Yung and Yunlei Zhao.
    A New Framework for RFID Privacy.
    (ESORICS'10, September 2010)
pdf bib
  • Rishab Nithyanand, Gene Tsudik and Ersin Uzun.
    Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems.
    (ESORICS'10, September 2010)
pdf bib
  • Albert Fernandez-Mir, Jordi Castella-Roca and Alexandre Viejo.
    Secure and Scalable RFID Authentication Protocol.
    (SETOP'10, September 2010)
pdf bib
  • Deepak Tagra, Musfiq Rahman and Srinivas Sampalli.
    Technique for Preventing DoS Attacks on RFID Systems.
    (SoftCOM'10, September 2010)
pdf bib
  • Ahmed Benfarah, Benoit Miscopein, Jean-Marie Gorce, Cédric Lauradoux and Bernard Roux.
    Distance Bounding Protocols on TH-UWB Link and their Analysis Over Noisy Channels.
    (Technical report, September 2010)
pdf bib
  • Kaleb Lee.
    A Two-Step Mutual Authentication Protocol Based on Randomized Hash-Lock for Small RFID Networks.
    (NSS 2010, September 2010)
pdf bib
  • Basel Alomair, Loukas Lazos and Radha Poovendran.
    Securing Low-cost RFID Systems: an Unconditionally Secure Approach.
    (JCS, August 2010)
pdf bib
  • Ching Yu Ng, Willy Susilo, Yi Mu and Rei Safavi-Naini.
    Practical RFID Ownership Transfer Scheme.
    (JCS, August 2010)
bib
  • Gerhard P. Hancke.
    Practical Eavesdropping and Skimming Attacks on High-Frequency RFID Tokens.
    (JCS, August 2010)
pdf bib
  • Kasper B. Rasmussen And Srdjan Capkun.
    Realization of RF Distance Bounding.
    (USENIX'10, August 2010)
pdf bib
  • Jonathan Katz, Ji Sun Shin and Adam Smith.
    Parallel and Concurrent Security of the HB and HB+ Protocols.
    (Journal of Cryptology, July 2010)
pdf bib
  • Sébastien Canard, Iwen Coisel, Jonathan Etrog and Marc Girault.
    Privacy-Preserving RFID Systems: Model and Constructions.
    (IACR ePrint, July 2010)
pdf bib
  • Mohammad Reza Sohizadeh Abyaneh.
    On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack.
    (IACR ePrint, July 2010)
pdf bib
  • Myrto Arapinis, Tom Chothia, Eike Ritter and Mark Ryan.
    Analysing Unlinkability and Anonymity Using the Applied Pi Calculus.
    (CSF'10, July 2010)
pdf bib
  • Mayla Bruso, Konstantinos Chatzikokolakis and Jerry den Hartog.
    Formal Verification of Privacy for RFID Systems.
    (CSF'10, July 2010)
pdf bib
  • Pier Francesco Cortese, Francesco Gemmiti, Bernardo Palazzi, Maurizio Pizzonia and Massimo Rimondini.
    Efficient and practical authentication of PUF-based RFID tags in supply chains.
    (RFID-TA'10, June 2010)
pdf bib
  • Sébastien Canard, Iwen Coisel and Marc Girault.
    Security of Privacy-Preserving RFID Systems.
    (RFID-TA'10, June 2010)
pdf bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Christos Dimitrakakis, Aikaterini Mitrokotsa and Juan M. Estevez-Tapiador.
    Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks.
    (CSF'10, June 2010)
pdf bib
  • Junzuo Lai, Robert H. Deng and Yingjiu Li.
    Revisiting Unpredictability-Based RFID Privacy Models.
    (ACNS'10, June 2010)
pdf bib
  • Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti and Christian Wachsmann.
    On RFID Privacy with Mutual Authentication and Tag Corruption.
    (ACNS'10, June 2010)
pdf bib
  • Nitesh Saxena and Jonathan Voris.
    Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model.
    (RFIDSec'10, June 2010)
pdf bib
  • Julio C. Hernandez-Castro, Pedro Peris-Lopez, Raphael C.W. Phan and Juan M. Estevez-Tapiador .
    Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol.
    (RFIDSec'10, June 2010)
pdf bib
  • Lishoy Francis, Gerhard P. Hancke, Keith Mayes and Konstantinos Markantonakis.
    Practical NFC Peer-to-Peer Relay Attack using Mobile Phones.
    (RFIDSec'10, June 2010)
pdf bib
  • Gildas Avoine, Xavier Carpent and Benjamin Martin.
    Strong Authentication and Strong Integrity (SASI) is not that Strong.
    (RFIDSec'10, June 2010)
pdf slides bib
  • Junfeng Fan, Jens Hermans and Frederik Vercauteren.
    On the Claimed Privacy of EC-RAC III.
    (RFIDSec'10, June 2010)
pdf bib
  • Ton van Deursen and Saša Radomirovic.
    EC-RAC: Enriching a Capacious RFID Attack Collection.
    (RFIDSec'10, June 2010)
pdf bib
  • Kurt Dietrich.
    Anonymous RFID Authentication using Trusted Computing Technologies.
    (RFIDSec'10, June 2010)
pdf bib
  • Gildas Avoine, Benjamin Martin and Tania Martin.
    Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly.
    (RFIDSec'10, June 2010)
pdf slides bib
  • Florian Kerschbaum and Nina Oertel.
    Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting .
    (RFIDSec'10, June 2010)
pdf bib
  • Gildas Avoine, Iwen Coisel and Tania Martin.
    Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols.
    (RFIDSec'10, June 2010)
pdf slides bib
  • Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi and Christian Wachsmann.
    Anonymous Authentication for RFID Systems.
    (RFIDSec'10, June 2010)
pdf bib
  • Shin'ichiro Matsuo, Le Trieu Phong, Miyako Ohkubo and Moti Yung.
    Leakage-Resilient RFID Authentication with Forward-Privacy.
    (RFIDSec'10, June 2010)
pdf bib
  • Michael Hutter, Martin Feldhofer and Thomas Plos.
    An ECDSA Processor for RFID Authentication.
    (RFIDSec'10, June 2010)
pdf bib
  • Gerhard de Koning Gans and Flavio Garcia.
    Towards a Practical Solution to the RFID Desynchronization Problem.
    (RFIDSec'10, June 2010)
pdf bib
  • Orhun Kara, Suleyman Kardas, Muhammed Ali Bingol and Gildas Avoine.
    Optimal Security Limits of RFID Distance Bounding Protocols.
    (RFIDSec'10, June 2010)
pdf slides bib
  • Rolando Trujillo Rasua, Benjamin Martin and Gildas Avoine.
    The Poulidor Distance-Bounding Protocol.
    (RFIDSec'10, June 2010)
pdf slides bib
  • Elif Bilge Kavun and Tolga Yalcin.
    A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications.
    (RFIDSec'10, June 2010)
pdf bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Tieyan Li and Yingjiu Li.
    Vulnerability analysis of RFID protocols for tag ownership transfer.
    (Computer Networks, June 2010)
pdf bib
  • Basel Alomair, Andrew Clark, Jorge Cuellar and Radha Poovendran.
    Scalable RFID Systems: a Privacy-Preserving Protocol with Constant-Time Identification.
    (DSN'10, June 2010)
pdf bib
  • Michael Weiss.
    Performing Relay Attacks on ISO 14443 Contactless Smart Cards using NFC Mobile Equipment.
    (Master Thesis, May 2010)
pdf bib
  • Pedro Peris-Lopez, Agustin Orfila, Julio C. Hernandez-Castro and Jan C.A. van der Lubbe.
    Flaws on RFID grouping-proofs. Guidelines for future sound protocols.
    (JNCA, May 2010)
pdf bib
  • Gerhard P. Hancke.
    Design of a Secure Distance-Bounding Channel for RFID.
    (JNCA, May 2010)
pdf bib
  • Roberto Di Pietro and Refik Molva.
    An optimal probabilistic solution for information confinement, privacy, and security in RFID systems.
    (JNCA, May 2010)
pdf bib
  • Jorge Munilla and Alberto Peinado.
    Attacks on a Distance Bounding Protocol.
    (Elsevier Computer Communications, May 2010)
pdf bib
  • Lishoy Francis, Gerhard Hancke, Keith Mayes And Konstantinos Markantonakis.
    A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions.
    (AICT 2010, May 2010)
pdf bib
  • Wang Shaohui And Wang Faxing.
    Security Analysis of Some RFID Authentication Protocols.
    (EBISS 2010, May 2010)No Keywords
pdf bib
  • Ahmad-Reza Sadeghi, Ivan Visconti and Christian Wachsmann.
    PUF-Enhanced RFID Security and Privacy.
    (SECSI'10, April 2010)
pdf bib
  • Trevor Burbridge and Andrea Soppera.
    Supply Chain Control Using a RFID Proxy Re-signature Scheme.
    (IEEE RIFD 2010, April 2010)
pdf bib
  • Yossef Oren and Avishai Wool.
    RFID-based Electronic Voting: What Could Possibly Go Wrong?.
    (IEEE RIFD 2010, April 2010)
pdf bib
  • Davide Zanetti, Leo Fellmann and Srdjan Capkun.
    Privacy-preserving Clone Detection for RFID-enabled Supply Chains.
    (IEEE RIFD 2010, April 2010)
pdf bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Esther Palomar and Jan C. A. van der Lubbe.
    Cryptographic Puzzles and Distance-bounding Protocols: Practical Tools for RFID Security.
    (IEEE RIFD 2010, April 2010)
pdf bib
  • Michael Braun, Ulrike Meyer and Susanne Wetzel.
    Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
    (WISTP'10, April 2010)
bib
  • Jaap-Henk Hoepman and Rieks Joosten.
    Practical Schemes for Privacy & Security Enhanced RFID.
    (WISTP'10, April 2010)
pdf bib
  • Gaurav Kapoor and Selwyn Piramuthu.
    Vulnerabilities in some recently proposed RFID ownership transfer protocols.
    (IEEE Communications Letters, March 2010)
pdf bib
  • Boyeon Song and Chris J. Mitchell.
    Scalable RFID Security Protocols supporting Tag Ownership Transfer.
    (ComCom, March 2010)
pdf bib
  • Flavio D. Garcia, Peter van Rossum, Roel Verdult and Ronny Wichers Schreur.
    Dismantling SecureMemory, CryptoMemory and CryptoRF.
    (IACR ePrint, March 2010)
pdf bib
  • Pedro Peris-Lopez, Li Tieyan and Julio C. Hernandez-Castro.
    Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard.
    (IEICE TIS 2010, March 2010)
bib
  • Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama and Goichiro Hanaoka.
    Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.
    (CT-RSA 2010, March 2010)
pdf bib
  • Rishab Nithyanand.
    Securing Personal RFID Tags and Infrastructures.
    (Master thesis, March 2010)
pdf bib
  • Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux and Jean-Yves Le Boudec.
    Effectiveness of Distance-decreasing Attacks Against Impulse Radio Ranging.
    (WiSec'10, March 2010)
bib
  • Yong Ki Lee, Lejla Batina, Dave Singelee and Ingrid Verbauwhede.
    Low-Cost Untraceable Authentication Protocols for RFID.
    (WiSec'10, March 2010)
bib
  • Yasunobu Nohara and Sozo Inoue.
    A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation.
    (WiSec'10, March 2010)
bib
  • Yanjun Zuo.
    RFID Survivability Quantification and Attack Modeling.
    (WiSec'10, March 2010)
bib
  • Olivier Billet, Jonathan Etrog and Henri Gilbert.
    Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher.
    (FSE'10, February 2010)
pdf bib
  • Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankarasubramaniam and Kapali Viswanathan.
    NLHB: A Non-Linear Hopper Blum Protocol.
    (arXiv, February 2010)
pdf bib
  • Matthew Robshaw and Axel Poschmann.
    The Case for Dynamic RFID Tag Authentication.
    (RFIDSec Asia'10, February 2010)
bib
  • Ching Yu Ng, Willy Susilo, Yi Mu and Rei Safavi-Naini.
    Practical RFID Ownership Transfer Scheme.
    (RFIDSec Asia'10, February 2010)
bib
  • Kuo-Hui Yeh, Naiwei Lo and Enrico Winata.
    An Efficient Ultralightweight Authentication Protocol for RFID Systems.
    (RFIDSec Asia'10, February 2010)
bib
  • Subhamoy Maitra, Santanu Sarkar and Morshed Chowdhury.
    Faster CRT-RSA Decryption Towards RFID Applications.
    (RFIDSec Asia'10, February 2010)No Keywords
bib
  • Senthilkumar Chinnappa Gounder Periaswamy, Dale R. Thompson and Henry P. Romero.
    Fingerprinting Radio Frequency Identification Tags Using Timing Characteristics.
    (RFIDSec Asia'10, February 2010)
bib
  • Zang Li, Chao-Hsien Chu and Wen Yao.
    Semantic Access Control for RFID-enabled Supply Chains.
    (RFIDSec Asia'10, February 2010)No Keywords
bib
  • Manfred Aigner.
    Security in the Internet of Things.
    (RFIDSec Asia'10, February 2010)
bib
  • Florian Kerschbaum and Manfred Aigner.
    Securing RFID-supported Supply Chains.
    (RFIDSec Asia'10, February 2010)
pdf bib
  • Kirti Chawla, Gabriel Robins and Westley Weimer.
    On the Presence of Covert Channels Embedded within RFID-Enabled Supply Chains.
    (RFIDSec Asia'10, February 2010)No Keywords
bib
  • Chin-Feng Lee, Yu-Chang Chen, Hung-Yu Chien and Chi-Sung Laih.
    Anonymous RFID Yoking Protocol Using Error Correction Codes.
    (RFIDSec Asia'10, February 2010)No Keywords
bib
  • Basel Alomair, Loukas Lazos and Radha Poovendran.
    Securing Low-Cost RFID Systems: an Unconditionally Secure Approach.
    (RFIDSec Asia'10, February 2010)
pdf bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador and Jan C. A. van der Lubbe.
    Security Flaws in a Recent Ultralightweight RFID Protocol.
    (RFIDSec Asia'10, February 2010)
bib
  • Aikaterini Mitrokotsa, Christos Dimitrakakis, Pedro Peris-Lopez and Julio C. Hernandez-Castro.
    Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels.
    (IEEE Communications Letters, February 2010)
pdf bib
  • Imran Erguler and Emin Anarim.
    Scalability and Security Conflict for RFID Authentication Protocols.
    (IACR ePrint, January 2010)
pdf bib
  • Sébastien Canard, Jonathan Etrog and Iwen Coisel.
    Lighten Encryption Schemes for Secure and Private RFID Systems.
    (WLC'10, January 2010)
bib
  • Guillermo Azuara, Joan Josep Piles, José Luis Salazar and José Luis Tornos.
    Reliable Food Traceability Using RFID Tagging.
    (WLC'10, January 2010)
bib
  • Joan Melia-Segui, Joaquin Garcia-Alfaro and Jordi Herrera-Joancomarti.
    Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags.
    (WLC'10, January 2010)
bib
  • Tom Chothia And Vitaliy Smirnov.
    A Traceability Attack Against e-Passports.
    (FC'10, January 2010)
pdf bib
  • Bing Liang.
    Security and Performance Analysis for RFID Protocols.
    (Master Thesis, 2010)
pdf bib
  • Frederik Armknecht, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti and Christian Wachsmann.
    Impossibility Results for RFID Privacy Notions.
    (TCS XI, 2010)
pdf bib
  • Paolo D'Arco And Alfredo De Santis.
    On Ultra-Lightweight RFID Authentication Protocols.
    (IEEE Transactions on Dependable and Secure Computing, 2010)
pdf bib
  • Basel Alomair and Radha Poovendran.
    Privacy versus Scalability in Radio Frequency Identification Systems.
    (ComCom, 2010)
pdf bib
  • Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng and Haixia Yao.
    Achieving High Security and Efficiency in RFID-tagged Supply Chains.
    (International Journal of Applied Cryptography, 2010)No Keywords
pdf bib
  • Kuo-Hui Yeh and N.W. Lo.
    Improvement of Two Lightweight RFID Authentication Protocols.
    (IASL 2010, 2010)
pdf bib
  • Lishoy Francis, Gerhard Hancke, Keith Mayes And Konstantinos Markantonakis.
    On the security issues of NFC enabled mobile phones.
    (International Journal of Internet Technology and Secured Transactions, 2010)No Keywords
pdf bib
  • Chiu C. Tan And Jie Wu.
    Security in RFID Networks and Communications.
    (Springer, 2010)
pdf bib

2009

  • Axel Poschmann, Matthew Robshaw, Frank Vater and Christof Paar.
    Lightweight Cryptography and RFID: Tackling the Hidden Overheads.
    (ICISC, December 2009)
pdf bib
  • Boyeon Song.
    RFID Authentication Protocols using Symmetric Cryptography.
    (PhD thesis, December 2009)
pdf bib
  • Luke Mirowski, Jacqueline Hartnett and Raymond Williams.
    How RFID Attacks Are Expressed in Output Data.
    (ISPAN'09, December 2009)
pdf bib
  • Luke Mirowski, Jacqueline Hartnett and Raymond Williams.
    Tyrell: A RFID simulation platform.
    (ISSNIP'09, December 2009)
pdf bib
  • Luke Mirowski, Jacqueline Hartnett And Raymond Williams.
    Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels.
    (IEEE Pervasive Computing, December 2009)
pdf bib
  • Dang Nguyen Duc and Kwangjo Kim.
    Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction.
    (IACR ePrint, December 2009)
pdf bib
  • Chong Hee Kim and Gildas Avoine.
    RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks.
    (CANS'09, December 2009)
pdf slides bib
  • Ahmad-Reza Sadeghi, Ivan Visconti and Christian Wachsmann.
    Anonymizer-Enabled Security and Privacy for RFID.
    (CANS'09, December 2009)
bib
  • Gildas Avoine, Christian Floerkemeier and Benjamin Martin.
    RFID Distance Bounding Multistate Enhancement.
    (IndoCrypt'09, December 2009)
pdf slides bib
  • Olivier Billet and Kaoutar El-Khiyaoui.
    Two Attacks against the Ff RFID Protocol.
    (IndoCrypt'09, December 2009)
bib
  • Kasper B. Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin and Srdjan Capkun.
    Proximity-based Access Control for Implantable Medical Devices.
    (ACM CCS'09, November 2009)
bib
  • Côme Berbain, Olivier Billet, Jonathan Etrog and Henri Gilbert.
    An Efficient Forward Private RFID Protocol.
    (ACM CCS'09, November 2009)
bib
  • Changshe Ma, Yingjiu Li, Robert H. Deng and Tieyan Li.
    RFID Privacy: Relation Between Two Notions, Minimal Condition, and Efficient Construction.
    (ACM CCS'09, November 2009)
bib
  • Lishoy Francis, Gerhard Hancke, Keith Mayes And Konstantinos Markantonakis.
    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.
    (ICITST'09, November 2009)
pdf bib
  • Boyeon Song and Chris J. Mitchell.
    Scalable RFID Authentication Protocol.
    (NSS 2009, October 2009)
pdf bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. E. Tapiador and Jan C. A. van der Lubbe.
    Security Flaws in a Recent Ultralightweight RFID Protocol.
    (arXiv, October 2009)
pdf bib
  • Ching Yu Ng, Willy Susilo, Yi Mu and Rei Safavi-Naini.
    New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.
    (ESORICS'09, September 2009)
pdf bib
  • Ton van Deursen, Sjouke Mauw, Saša Radomirovic and Pim Vullers.
    Secure Ownership and Ownership Transfer in RFID Systems.
    (ESORICS'09, September 2009)
pdf bib
  • Joaquin Garcia-Alfaro, Michel Barbeau and Evangelos Kranakis.
    Security Threat Mitigation Trends in Low-cost RFID Systems.
    (SETOP'09, September 2009)
pdf bib
  • Carlo Blundo, Angelo De Caro and Giuseppe Persiano.
    Untraceable Tags based on Mild Assumptions.
    (SETOP'09, September 2009)
bib
  • Rafik Chaabouni and Serge Vaudenay.
    The Extended Access Control for Machine Readable Travel Documents.
    (BIOSIG 2009, September 2009)
pdf bib
  • Erik-Oliver Blass, Kaoutar El-Khiyaoui and Refik Molva.
    PPS: Privacy Preserving Statistics using RFID Tags.
    (IACR ePrint, September 2009)
pdf bib
  • Rishab Nithyanand, Gene Tsudik and Ersin Uzun.
    Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems.
    (IACR ePrint, September 2009)
pdf bib
  • Ton van Deursen and Saša Radomirovic.
    Algebraic Attacks on RFID Protocols.
    (WISTP'09, September 2009)
pdf bib
  • Helen Balinsky, Edward McDonnell, Liqun Chen and Keith Harrison.
    Anti-Counterfeiting using Memory Spots.
    (WISTP'09, September 2009)
bib
  • Nicolas T. Courtois, Sean O'Neil and Jean-Jacques Quisquater.
    Practical Algebraic Attacks on the Hitag2 Stream Cipher.
    (ISC'09, September 2009)
bib
  • Gildas Avoine and Aslan Tchamkerten.
    An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement.
    (ISC'09, September 2009)
pdf slides bib
  • Zeeshan Bilal, Ashraf Masood and Firdous Kausar.
    Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol.
    (NBIS'09, August 2009)
bib
  • Y.-C. Lee, Y.-C. Hsieh, P.-S. You and T.-C. Chen.
    A New Ultralightweight RFID Protocol with Mutual Authentication.
    (ICIE'09, August 2009)
pdf bib
  • Gildas Avoine, Cédric Lauradoux and Tania Martin.
    When Compromised Readers Meet RFID.
    (WISA'09, August 2009)
pdf slides bib
  • Marc Langheinrich.
    A Survey of RFID Privacy Approaches.
    (PUC'09, August 2009)
pdf bib
  • Matthias Krause and Dirk Stegemann.
    More on the Security of Linear RFID Authentication Protocols.
    (SAC'09, August 2009)
slides bib
  • Yossef Oren and Avishai Wool.
    Relay Attacks on RFID-Based Electronic Voting Systems.
    (IACR ePrint, August 2009)
pdf bib
  • Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu and Ari Juels.
    CCCP: Secure Remote Storage for Computational RFIDs.
    (USENIX'09, August 2009)
pdf bib
  • Boris Danev, Thomas S. Heydt-Benjamin And Srdjan Čapkun.
    Physical-layer Identification of RFID Devices.
    (USENIX'09, August 2009)
bib
  • Aikaterini Mitrokotsa, Melanie R. Rieback and Andrew S. Tanenbaum.
    Classifying RFID Attacks and Defenses.
    (ISF 2009, July 2009)
pdf bib
  • Mike Burmester and Jorge Munilla.
    A Flyweight RFID Authentication Protocol.
    (RFIDSec'09, July 2009)
pdf slides bib
  • Dmitry Frumkin and Adi Shamir.
    Un-Trusted-HB: Security Vulnerabilities of Trusted-HB.
    (RFIDSec'09, July 2009)
bib
  • Gildas Avoine, Cédric Lauradoux and Tania Martin.
    When Compromised Readers Meet RFID (extended version).
    (RFIDSec'09, July 2009)
pdf slides bib
  • Nicolas T. Courtois.
    The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime.
    (RFIDSec'09, July 2009)
slides bib
  • Gauthier Van Damme, Karel Wouters and Bart Preneel.
    Practical Experiences with NFC Security on mobile Phones.
    (RFIDSec'09, July 2009)
slides bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Tieyan Li and Jan C.A. van der Lubbe.
    Weaknesses in Two Recent Lightweight RFID Authentication Protocols.
    (RFIDSec'09, July 2009)
slides bib
  • Flavio D. Garcia and Peter van Rossum.
    Modeling Privacy for Off-line RFID Systems.
    (RFIDSec'09, July 2009)
slides bib
  • Timo Kasper, David Oswald and Christof Paar.
    New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs.
    (RFIDSec'09, July 2009)
pdf slides bib
  • Ahmad-Reza Sadeghi, Ivan Visconti and Christian Wachsmann.
    Efficient RFID Security and Privacy with Anonymizers.
    (RFIDSec'09, July 2009)
bib
  • Tzipora Halevi, Nitesh Saxena and Shai Halevi.
    Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population.
    (RFIDSec'09, July 2009)
slides bib
  • Junfeng Fan and Ingrid Verbauwhede.
    Hyperelliptic curve processor for RFID tags.
    (RFIDSec'09, July 2009)
bib
  • Paolo D'Arco, Alessandra Scafuro and Ivan Visconti.
    Semi-Destructive Privacy in RFID Systems.
    (RFIDSec'09, July 2009)
slides bib
  • Jonathan Voris and Nitesh Saxena.
    We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags.
    (RFIDSec'09, July 2009)
slides bib
  • Khaled Ouafi and Serge Vaudenay.
    Pathchecker: an RFID Application for Tracing Products in Suply-Chains.
    (RFIDSec'09, July 2009)
pdf slides bib
  • Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir and Abdullatif Shikfa.
    The Ff-Family of Protocols for RFID-Privacy and Authentication.
    (RFIDSec'09, July 2009)
pdf slides bib
  • Christoph Nagl and Michael Hutter.
    Coupon Recalculation for the Schnorr and GPS Identification Scheme: A Performance Evaluation.
    (RFIDSec'09, July 2009)
pdf slides bib
  • Jiang Wu and Douglas R. Stinson.
    A Highly Scalable RFID Authentication Protocol.
    (ACISP'09, July 2009)
bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Jan C. A. van der Lubbe.
    Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks.
    (arXiv, June 2009)
pdf bib
  • Michael Hutter, Marcel Medwed, Daniel Hein, and Johannes Wolkerstorfer.
    Attacking ECDSA-Enabled RFID Devices.
    (ACNS'09, June 2009)
bib
  • Mathieu David And Neeli R. Prasad.
    Providing Strong Security and High Privacy in Low-Cost RFID Networks.
    (Security and Privacy in Mobile Information and Communication Systems, June 2009)
pdf bib
  • Gerhard P. Hancke, Keith Mayes And Konstantinos Markantonakis.
    Confidence in Smart Token Proximity: Relay Attacks Revisited.
    (Elsevier Computers & Security, June 2009)
bib
  • Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Pedro Peris-Lopez and Jean-Jacques Quisquater.
    Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations.
    (WCC'08, May 2009)
pdf bib
  • Ingo Liersch.
    Electronic passports - from secure specifications to secure implementations.
    (Elsevier Information Security Technical Report, May 2009)
pdf bib
  • Keith Mayes, Konstantinos Markantonakis and Gerhard P. Hancke.
    Transport ticketing security and fraud controls.
    (Elsevier Information Security Technical Report, May 2009)
pdf bib
  • Mikko Lehtonen, Daniel Ostojic, Alexander Ilic and Florian Michahelles.
    Securing RFID Systems by Detecting Tag Cloning.
    (Pervasive Computing, May 2009)
pdf bib
  • Rishab Nithyanand.
    The Evolution of Cryptographic Protocols in Electronic Passports.
    (IACR ePrint, May 2009)
pdf bib
  • Flavio D. Garcia, Peter van Rossum, Roel Verdult and Ronny Wichers Schreur.
    Wirelessly Pickpocketing a Mifare Classic Card.
    (IEEE S&P 2009, May 2009)
pdf bib
  • Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Pedro Peris-Lopez, John A. Clark and El-Ghazali Talbi.
    Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol.
    (IPDPS 2009, May 2009)
pdf bib
  • Mike Burmester, Breno de Medeiros, Jorge Munilla and Alberto Peinado.
    Secure EPC Gen2 compliant Radio Frequency Identification.
    (IACR ePrint, May 2009)
pdf bib
  • Mike Burmester, Tri van Le and Breno de Medeiros.
    Universally Composable RFID Identification and Authentication Protocols.
    (TISSEC, April 2009)
pdf bib
  • Mu'awya Naser, Mohammad Al Majaly, Muhammad Rafie and Rahmat Budiarto.
    A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model.
    (ICSAP'09, April 2009)
pdf bib
  • Mikko Lehtonen, Antti Ruhanen, Florian Michahelles and Elgar Fleisch.
    Serialized TID numbers - A headache or a blessing for RFID crackers?.
    (IEEE RFID 2009, April 2009)
pdf bib
  • Mikko Lehtonen, Florian Michahelles and Elgar Fleisch.
    How to detect cloned tags in a reliable way from incomplete RFID traces.
    (IEEE RFID 2009, April 2009)
pdf bib
  • Trevor Burbridge and Mark Harrison.
    Security Considerations in the Design and Peering of RFID Discovery Services.
    (IEEE RFID 2009, April 2009)
bib
  • Markus Vogt, Axel Poschmann and Christof Paar.
    Cryptography is Feasible on 4-Bit Microcontrollers - A Proof of Concept.
    (IEEE RFID 2009, April 2009)
bib
  • Bongno Yoon.
    HB-MP++ Protocol: An Ultra Light-weight Authentication Protocol for RFID system.
    (IEEE RFID 2009, April 2009)
bib
  • Yong Ki Lee, Lejla Batina and Ingrid Verbauwhede.
    Untraceable RFID Authentication Protocols: Revision of EC-RAC.
    (IEEE RFID 2009, April 2009)
bib
  • Benjamin Fung, Khalil Al-Hussaeni and Ming Cao.
    Preserving RFID Data Privacy.
    (IEEE RFID 2009, April 2009)
bib
  • Jiang Wu and Douglas R. Stinson.
    How to Improve Security and Reduce Hardware Demands of the WIPR RFID Protocol.
    (IEEE RFID 2009, April 2009)
pdf bib
  • Rushikesh Khasgiwale, Rohan Adyanthaya and Daniel Engels.
    Extracting Information from Tag Collisions.
    (IEEE RFID 2009, April 2009)
bib
  • Li Lu, Yunhao Liu and Jinsong Han.
    ACTION: Breaking the Privacy Barrier for RFID Systems.
    (IEEE InfoCom 2009, April 2009)
pdf bib
  • Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiang-Yang Li and Yunhao Liu.
    Randomizing RFID Private Authentication.
    (PerCom'09, March 2009)
pdf bib
  • Jorge Munilla and Alberto Peinado.
    Enhanced Low-cost RFID Protocol to Detect Relay Attacks.
    (WCMC 2009, March 2009)
pdf bib
  • Jen-Chun Chang and Hsin-Lung Wu.
    A Hybrid RFID Protocol against Tracking Attacks.
    (IACR ePrint, March 2009)
pdf bib
  • Julien Bringer, Hervé Chabanne and Thomas Icart.
    Efficient Zero-Knowledge Identification Schemes which respect Privacy.
    (ASIACCS'09, March 2009)
bib
  • Yossef Oren and Martin Feldhofer.
    A Low-Resource Public-Key Identification Scheme for RFID Tags and Sensor Nodes.
    (WiSec'09, March 2009)
pdf slides bib
  • Cai Shaoying, Yingjiu Li, Tieyan Li and Robert H. Deng.
    Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions.
    (WiSec'09, March 2009)
bib
  • Florian Kerschbaum and Alessandro Sorniotti.
    RFID-Based Supply Chain Partner Authentication and Key Agreement.
    (WiSec'09, March 2009)
bib
  • Pablo Najera, Francisc Moyano And Javier Lopez.
    Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents.
    (Journal of Universal Computer Science, March 2009)
pdf bib
  • Shlomi Dolev, Marina Kopeetsky and Adi Shamir.
    RFID Authentication Efficient Proactive Information Security within Computational Security.
    (TCS'09, 2009)
pdf bib
  • Somanath Tripathy and Sukumar Nandi.
    Cellular Automata-based Authentication for Low-cost RFID Systems.
    (IJCNDS, 2009)
pdf bib
  • Denis Trček, Pekka Jäppinen.
    Non-deterministic Lightweight Protocols for Security and Privacy in RFID Environments.
    (Auerbach Publication, 2009)No Keywords
pdf bib
  • Sarah Spiekermann and Sergei Evdokimov.
    Privacy Enhancing Technologies for RFID - A Critical Investigation of State of the Art Research.
    (IEEE Privacy and Security 2009, 2009)
pdf bib
  • Hung-Min Sun And Wei-Chih Ting.
    A Gen2-based RFID Authentication Protocol for Security and Privacy.
    (IEEE Transactions on Mobile Computing, 2009)
pdf bib

2008

  • Gaurav Kapoor, Wei Zhou and Selwyn Piramuthu.
    Distance Bounding Protocol for Multiple RFID Tag Authentication.
    (EUC'08, December 2008)
pdf bib
  • Pedro Peris-Lopez, Tong-Lee Lim and Tieyan Li.
    Providing Stronger Authentication at a Low-Cost to RFID Tags Operating under the EPCglobal Framework.
    (EUC'08, December 2008)
pdf bib
  • Julien Bringer, Hervé Chabanne and Thomas Icart.
    Cryptanalysis of EC-RAC, a RFID identification protocol.
    (CANS 2008, December 2008)
pdf bib
  • Khaled Ouafi, Raphael Overbeck and Serge Vaudenay.
    On the Security of HB# against a Man-in-the-Middle Attack.
    (ASIACRYPT 2008, December 2008)No Keywords
pdf bib
  • Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert and Olivier Pereira.
    The Swiss-Knife RFID Distance Bounding Protocol.
    (ICISC 2008, December 2008)
pdf slides bib
  • Basel Alomair and Radha Poovendran.
    On the Authentication of RFID Systems with Bitwise Operations.
    (NTMS'08, November 2008)
pdf bib
  • Jorge Munilla and Alberto Peinado.
    Security Analysis of Tu and Piramuthu's Protocol.
    (NTMS'08, November 2008)
pdf bib
  • Dorice Diane Nyamy, Simon Elrharbi, Pascal Urien, Hervé Chabanne, Thomas Icart, Cyrille Pépin, Mathieu Bouet, Daniel De Oliveira Cunha, Vincent Guyot, Patrice Krzanik and Jean-Ferdinand Susini.
    HIP-Tags, a new paradigm for the Internet of Things.
    (IFIP'08, November 2008)
pdf bib
  • Martin Feldhofer.
    Low-Power Hardware Design of Cryptographic Algorithms for RFID Tags.
    (PhD Thesis, November 2008)
bib
  • Pedro Peris-Lopez.
    Lightweight Cryptography in Radio Frequency Identification (RFID) Systems.
    (PhD Thesis, November 2008)
pdf bib
  • Kasper B. Rasmussen and Srdjan Capkun.
    Location Privacy of Distance Bounding Protocols.
    (ACM CCS'08, October 2008)
pdf bib
  • Joaquin Garcia-Alfaro, Michel Barbeau and Evangelos Kranakis.
    Evaluation of Anonymized ONS Queries.
    (SETOP'08, October 2008)
pdf slides bib
  • Ahmad-Reza Sadeghi, Ivan Visconti and Christian Wachsmann.
    User Privacy in Transport Systems Based on RFID E-Tickets.
    (PILBA'08, October 2008)
pdf bib
  • Pascal Urien, Dorice Nyami, Simon Elrharbi, Hervé Chabanne, Thomas Icart, Cyrille Pépin, Mathieu Bouet, Daniel De Oliveira Cunha, Vincent Guyot, Guy Pujolle, Eric Gressier-Soudan and Jean-Ferdinand Susini.
    HIP Tags Privacy Architecture.
    (ICSNC'08, October 2008)
pdf bib
  • Wouter Teepe.
    Making the Best of Mifare Classic.
    (Manuscript, October 2008)
pdf bib
  • Boyeon Song.
    Server Impersonation Attacks on RFID Protocols.
    (UBICOMM'08, October 2008)
pdf bib
  • JungHoon Ha, SangJae Moon, Jianying Zhou and JaeCheol Ha.
    A New Formal Proof Model for RFID Location Privacy.
    (ESORICS 2008, October 2008)
pdf bib
  • Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, and Ronny Wichers Schreur.
    Dismantling MIFARE Classic.
    (ESORICS 2008, October 2008)
pdf slides bib
  • Tassos Dimitriou.
    RFID Security and Privacy.
    (RFID Security 2008, September 2008)
pdf bib
  • Karsten Nohl and David Evans.
    Hiding in Groups: On the Expressiveness of Privacy Distributions.
    (SEC 2008, September 2008)
pdf bib
  • Tassos Dimitriou.
    RFID-DOT: RFID Delegation and Ownership Transfer made simple.
    (SecureComm 2008, September 2008)
pdf bib
  • Gildas Avoine and Aslan Tchamkerten.
    An asymptotically optimal RFID protocol against relay attacks.
    (IACR ePrint, September 2008)
pdf bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda.
    Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol.
    (WISA'08, September 2008)
pdf bib
  • Carsten Rolfes, Axel Poschmann, Gregor Leander and Christof Paar.
    Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents.
    (CARDIS'08, September 2008)
pdf bib
  • Georg Hofferek and Johannes Wolkerstorfer.
    Coupon Recalculation for the GPS Authentication Scheme.
    (CARDIS'08, September 2008)
bib
  • Mike Burmester, Breno de Medeiros and Rossana Motta.
    Provably Secure Grouping-Proofs for RFID Tags.
    (CARDIS'08, September 2008)
pdf bib
  • Gerhard de Koning Gans, Jaap-Henk Hoepman and Flavio D. Garcia.
    A Practical Attack on the MIFARE Classic.
    (CARDIS'08, September 2008)No Keywords
pdf bib
  • Tieyan Li.
    Employing Lightweight Primitives on Low-Cost RFID Tags for Authentication.
    (VTC 2008, September 2008)No Keywords
pdf bib
  • Julien Bringer and Hervé Chabanne.
    Trusted-HB: A Low-Cost Version of HB+ Secure Against Man-in-the-Middle Attacks.
    (IEEE TIT 2008, August 2008)
bib
  • Cai Qingling, Zhan Yiju and Wang Yonghua.
    A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis.
    (CCCM'08, August 2008)
pdf bib
  • Julien Bringer, Hervé Chabanne and Thomas Icart.
    Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function.
    (SCN'2008, August 2008)
pdf bib
  • Jooyoung Lee and Yongjin Yeom.
    Efficient RFID Authentication Protocols Based on Pseudorandom Sequence Generators.
    (IACR ePrint, August 2008)
pdf bib
  • Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew Robshaw and Yannick Seurin.
    Hash Functions and RFID Tags : Mind The Gap.
    (CHES'08, August 2008)
pdf bib
  • Michael Hutter and Jörn-Marc Schmidt and Thomas Plos.
    RFID and its Vulnerability to Faults.
    (CHES'08, August 2008)
bib
  • Ton van Deursen and Saša Radomirovic.
    Attacks on RFID Protocols.
    (IACR ePrint, July 2008)
pdf bib
  • Ventzislav Nikov and Marc Vauclair.
    Yet Another Secure Distance-Bounding Protocol.
    (IACR ePrint, July 2008)
pdf bib
  • Yossef Oren And Martin Feldhofer.
    WIPR - a Public Key Identification on Two Grains of Sand.
    (RFIDSec'08, July 2008)
pdf slides bib
  • Daniel Hein, Johannes Wolkerstorfer And Norbert Felber.
    ECC is Ready for RFID – A Proof in Silicon.
    (RFIDSec'08, July 2008)
slides bib
  • Maire O’Neill (McLoone).
    Low-Cost SHA-1 Hash Function Architecture for RFID Tags.
    (RFIDSec'08, July 2008)
pdf slides bib
  • Pedro Peris-Lopez, Tieyan Li, Lim Tong Lee, Julio C. Hernandez-Castro And Juan M. Estevez- Tapiador.
    Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard.
    (RFIDSec'08, July 2008)
pdf slides bib
  • Mate Soos.
    Analysing the Molva and Di Pietro Private RFID Authentication Scheme.
    (RFIDSec'08, July 2008)
pdf slides bib
  • Carlo Blundo, Guiseppe Persiano, Ahmad-Reza Sadeghi and Ivan Visconti.
    Resettable and Non-Transferable Chip Authentication for E-Passports.
    (RFIDSec'08, July 2008)
pdf bib
  • Sébastien Canard And Iwen Coisel.
    Data Synchronization in Privacy-Preserving RFID Authentication Schemes.
    (RFIDSec'08, July 2008)
pdf slides bib
  • Gerhard P. Hancke.
    Eavesdropping Attacks on High-Frequency RFID Tokens.
    (RFIDSec'08, July 2008)
pdf slides bib
  • Thomas Plos, Michael Hutter And Martin Feldhofer.
    Evaluation of Side-Channel Preprocessing Techniques on Cryptographic-Enabled HF and UHF RFID-Tag Prototypes.
    (RFIDSec'08, July 2008)
pdf slides bib
  • Ali Atici, Lejla Batina, Benedikt Gierlichs and Ingrid Verbauwhede.
    Power analysis on NTRU implementations for RFIDs: First results.
    (RFIDSec'08, July 2008)
pdf bib
  • Dennis Kuegler, Heike Neumann, Sebastian Stappert, Markus Ullmann And Matthias Voegeler.
    Password Authenticated Key Agreement for Contactless Smart Cards.
    (RFIDSec'08, July 2008)
pdf slides bib
  • Boyeon Song.
    RFID Tag Ownership Transfer.
    (RFIDSec'08, July 2008)
pdf slides bib
  • Ari Juels, Ravikanth Pappu and Bryan Parno.
    Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
    (USENIX Security Symposium, July 2008)
pdf bib
  • Karsten Nohl, David Evans, Starbug and Henryk Plötz.
    Reverse-Engineering a Cryptographic RFID Tag.
    (USENIX Security Symposium, July 2008)
pdf bib
  • Ivo Pooters.
    Keep Out of My Passport: Access Control Mechanisms in E-passports.
    (Manuscript, June 2008)
pdf bib
  • Aikaterini Mitrokotsa, Melanie R. Rieback and Andrew S. Tanenbaum.
    Classification of RFID Attacks.
    (IWRT 2008, June 2008)
pdf bib
  • Khaled Ouafi and Raphael C.-W. Phan.
    Traceable Privacy of Recent Provably-Secure RFID Protocols.
    (ACNS 2008, June 2008)
pdf bib
  • Pawel Rotter.
    A Framework for Assessing RFID System Security and Privacy Risks.
    (IEEE Pervasive Computing, June 2008)
pdf bib
  • Mike Burmester, Breno de Medeiros.
    The Security of EPC Gen2 Compliant RFID Protocols.
    (ACNS 2008, June 2008)
pdf bib
  • Selwyn Piramuthu.
    Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems.
    (IEEE TSMC, May 2008)
pdf bib
  • Ton van Deursen, Sjouke Mauw and Saša Radomirovic.
    Untraceability of RFID Protocols.
    (ISTP, May 2008)
pdf bib
  • Bo Sheng, Chiu Chiang Tan, Qun Li and Weizhen Mao.
    Finding popular categories for RFID tags.
    (MobiHoc'08, May 2008)
pdf bib
  • Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno and William H. Maisel.
    Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
    (IEEE S&P, May 2008)
pdf bib
  • Henning Richter, Wojciech Mostowski and Erik Poll.
    Fingerprinting Passports.
    (Epractice, April 2008)
pdf slides bib
  • K. H. S. Sabaragamu Koralalage and Jingde Cheng.
    A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions.
    (IEEE Computer Society Press, April 2008)
pdf slides bib
  • Vijayakrishnan Pasupathinathan, Josef Pieprzyk and Huaxiong Wang.
    An On-Line Secure E-Passport Protocol.
    (ISPEC 2008, April 2008)
pdf bib
  • Khaled Ouafi and Raphael C.-W. Phan.
    Privacy of Recent RFID Authentication Protocols.
    (ISPEC 2008, April 2008)
pdf bib
  • Nicolas T. Courtois, Karsten Nohl and Sean O'Neil.
    Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards.
    (IACR ePrint, April 2008)
pdf slides bib
  • Shi-Cho Cha, Kuan-Ju Huang and Hsiang-Meng Chang.
    An Efficient and Flexible Way to Protect Privacy in RFID Environment with Licenses.
    (IEEE RFID 2008, April 2008)
pdf bib
  • Srinivas Devadas, Edward Suh, Sid Paral, Richard Sowell, Tom Ziola and Vivek Khandelwal.
    Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications.
    (IEEE RFID 2008, April 2008)
pdf bib
  • Yong Ki Lee, Lejla Batina and Ingrid Verbauwhede.
    EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol.
    (IEEE RFID 2008, April 2008)
pdf bib
  • Xuefei Leng, Keith Mayes and Konstantinos Markantonakis.
    HB-MP+ Protocol: An Improvement on the HB-MP Protocol.
    (IEEE RFID 2008, April 2008)
pdf bib
  • Han Shuihua and Chao-Hsien Chu.
    Tamper Detection in RFID-Enabled Supply Chains Using Fragile Watermarking.
    (IEEE RFID 2008, April 2008)
pdf bib
  • Akira Yamamoto, Shigeya Suzuki, Hisakazu Hada, Jin Mitsugi, Fumio Teraoka and Osamu Nakamura.
    A Tamper Detection Method for RFID Tag Data.
    (IEEE RFID 2008, April 2008)
pdf bib
  • Huafei Zhu and Feng Bao.
    Aggregating Symmetric/Asymmetric Attestations.
    (IEEE RFID 2008, April 2008)
pdf bib
  • Boyeon Song and Chris J Mitchell.
    RFID Authentication Protocol for Low-cost Tags.
    (WiSec'08, March-April 2008, April 2008)
pdf bib
  • Gerhard P. Hancke and Markus Kuhn.
    Attacks on Time-of-Flight Distance Bounding Channels.
    (WiSec'08, March-April 2008, April 2008)
pdf bib
  • Pascal Urien, Simon Elrharbi, Hervé Chabanne, Thomas Icart, Cyrille Pépin, Mathieu Bouet, Daniel De Oliveira Cunha, Vincent Guyot, Guy Pujolle, Eric Gressier-Soudan and Jean-Ferdinand Susini.
    HIP tags, a privacy architecture for networking in the Internet of Things.
    (NAEC 2008, March 2008)
bib
  • Tieyan Li, Guilin Wang and Robert H. Deng.
    Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols.
    (Journal of Software, March 2008)
pdf bib
  • Yawer Yousuf and Vidyasagar Potdar.
    A Survey of RFID Authentication Protocols.
    (AINAW 2008, March 2008)
pdf bib
  • Radu-Ioan Paise and Serge Vaudenay.
    Mutual Authentication in RFID: Security and Privacy.
    (ASIACCS'08, March 2008)
pdf bib
  • Denis Trček and Damjan Kovač.
    Formal apparatus for measurement of lightweight protocols.
    (Computer Standards & Interfaces, March 2008)
pdf bib
  • Yasunobu Nohara, Sozo Inoue And Hiroto Yasuura.
    A secure high-speed identification scheme for RFID using Bloom filters.
    (AReS 2008, March 2008)
pdf bib
  • Gerhard P. Hancke.
    Security of Proximity Identification Systems.
    (PhD Thesis, February 2008)
pdf bib
  • Soo-Hyun Choi and You-Hyeon Jeong.
    A Secure and Scalable Transaction Protocol for Ubiquitous Sensor Network using RFID Systems.
    (ICACT 2008, February 2008)
pdf bib
  • Jorge Munilla and Alberto Peinado.
    Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels.
    (WCMC 2008, January 2008)
pdf bib
  • Mala Mitra.
    Privacy for Systems to Prevent Tracking and Cloning.
    (International Journal of Computer Science and Network Security, January 2008)
pdf bib
  • Henri Gilbert, Matthew Robshaw and Yannick Seurin.
    Good Variants of HB+ are Hard to Find.
    (FC'08, January 2008)
pdf bib
  • Gildas Avoine, Kassem Kalach and Jean-Jacques Quisquater.
    ePassport: Securing International Contacts with Contactless Chips.
    (FC'08, January 2008)
pdf slides bib
  • Tassos Dimitriou.
    Proxy Framework for Enhanced RFID Security and Privacy.
    (Consumer Communications and Networking Conference, January 2008)
pdf bib
  • Irfan Syamsuddin, Tharam Dillon, Elizabeth Chang And Song Han.
    A survey of RFID authentication protocols based on hash-chain method.
    (ICCIT'08, 2008)
pdf bib
  • Mike Burmester and Breno de Medeiros and Rossana Motta.
    Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries.
    (International Journal of Applied Cryptography, 2008)
pdf bib
  • Roel Verdult.
    Security analysis of RFID tags.
    (Master Thesis, 2008)
pdf bib
  • Gerhard de Koning Gans.
    Analysis of the Mifare Classic used in the OV-Chipkaart Project.
    (Master Thesis, 2008)
pdf bib
  • Karl Koscher, Ari Juels, Tadayoshi Kohno and Vjekoslav Brajkovic.
    EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond.
    (Manuscript, 2008)
pdf bib
  • Melanie R. Rieback.
    Security and Privacy of Radio Frequency Identification.
    (PhD Thesis, 2008)
pdf bib
  • Pawel Rotter, Barbara Daskala and Ramón Compano.
    RFID implants: Opportunities and challenges for identifying people.
    (IEEE Technology and Security Magazine, Summer 2008, 2008)
pdf bib
  • Raphael C.-W. Phan.
    Cryptanalysis of a New Ultralightweight RFID Authentication Protocol - SASI.
    (IEEE Transactions on Dependable and Secure Computing, 2008)No Keywords
pdf bib
  • Wenyi Che, Huan Deng, Wang Tan And Junyu Wang.
    A Random Number Generator for Application in RFID Tags.
    (Springer Berlin Heidelberg, 2008)
pdf bib

2007

  • Hung-Yu Chien and Chen-Wei Huang.
    A Lightweight RFID Protocol Using Substring.
    (EUC'09, December 2007)
pdf bib
  • Youngjoon Seo.
    A Study on Scalable and Untraceable Authentication Protocol of RFID tags.
    (Master Thesis, December 2007)
pdf bib
  • Marc Langheinrich and Remo Marti.
    Practical Minimalist Cryptography for RFID Privacy.
    (IEEE Systems Journal, December 2007)
pdf bib
  • John Ayoade.
    Privacy and RFID Systems: Roadmap to solving security and privacy concerns in RFID systems.
    (Computer Law and Security Report, December 2007)
pdf bib
  • Hung-Yu Chien.
    SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity.
    (IEEE TDSC, December 2007)
pdf bib
  • Serge Vaudenay.
    On Privacy Models for RFID.
    (Asiacrypt'07, December 2007)
pdf bib
  • Pedro Peris-Lopez and Julio C. Hernandez-Castro and Juan M. Estevez-Tapiador and Arturo Ribagorda.
    LAMED - A PRNG for EPC Class-1 Generation-2 RFID Specification.
    (Computer Standard & Interface, December 2007)
pdf bib
  • Pedro Peris-Lopez and Julio C. Hernandez-Castro and Juan M. Estevez-Tapiador and Arturo Ribagorda.
    An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks.
    (SecUbiq'07, December 2007)
pdf bib
  • Batbold Toiruul, KyungOh Lee, and JinMook Kim.
    SLAP - A Secure but Light Authentication Protocol for RFID Based on Modular Exponentiation.
    (UBICOMM'07, November 2007)
pdf bib
  • Mauro Conti and Roberto Di Pietro and Luigi Vincenzo Mancini and Angelo Spognardi.
    FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronization.
    (IEEE IECON'07, November 2007)
pdf bib
  • Mike Burmester and Breno de Medeiros and Rossana Motta.
    Robust, Anonymous RFID Authentication with Constant Key-Lookup.
    (IACR ePrint, October 2007)
pdf bib
  • Tieyan Li And Guilin Wan.
    SLMAP - A Secure ultra-Lightweight RFID Mutual Authentication Protocol.
    (CHINACRYPT'07, October 2007)No Keywords
bib
  • Mihaly Barasz, Balazs Boros, Peter Ligeti, Krisztina Loja, and Daniel Nagy.
    Breaking EMAP.
    (SecureComm, September 2007)
pdf bib
  • Roberto Di Pietro and Refik Molva.
    Information Confinement, Privacy, and Security in RFID Systems.
    (ESORICS'07, September 2007)
pdf bib
  • Sepideh Fouladgar and Hossam Afifi.
    An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags.
    (RFID Technology, September 2007)
pdf bib
  • Gerhard P. Hancke.
    Noisy Carrier Modulation for HF RFID.
    (RFID Technology, September 2007)
pdf bib
  • Yu-Ju Tu and Selwyn Piramuthu.
    RFID Distance Bounding Protocols.
    (RFID Technology, September 2007)
pdf bib
  • Mihaly Barasz, Balazs Boros, Peter Ligeti, Krisztina Loja, and Daniel Nagy.
    Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags.
    (RFID Technology, September 2007)
pdf bib
  • Andrey Bogdanov, Lars Ramkilde Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew Robshaw, Yannick Seurin and C. Vikkelsoe.
    PRESENT: An Ultra-Lightweight Block Cipher.
    (CHES'07, September 2007)
pdf slides bib
  • Olivier Savry, Florian Pebay-Peyroula, François Dehmas, Gérard Robert, and Jacques Reverdy.
    RFID Noisy Reader How to Prevent from Eavesdropping on the Communication.
    (CHES'07, September 2007)
pdf bib
  • Michael Hutter, Stefan Mangard, and Martin Feldhofer.
    Power and EM Attacks on Passive 13.56 MHz RFID Devices.
    (CHES'07, September 2007)
pdf slides bib
  • Yifei Liu, Timo Kasper, Kerstin Lemke-Rust And Christof Paar.
    E-Passport: Cracking Basic Access Control Keys with COPACOBANA.
    (SHARCS'07, September 2007)
pdf bib
  • Yossef Oren.
    Remote Power Analysis of RFID Tags.
    (IACR ePrint, August 2007)
pdf bib
  • Pascal Urien, Hervé Chabanne, Cyrille Pépin, Mathieu Bouet, Daniel De Oliveira Cunha, Vincent Guyot, Guy Pujolle, Pierre Paradinas, Eric Gressier-Soudan and Jean-Ferdinand Susini.
    HIP-based RFID Networking Architecture.
    (WOCN'07, July 2007)
pdf bib
  • Pieter Siekerman and Maurits van der Schee.
    Security Evaluation of the disposable OV-chipkaart.
    (Report , July 2007)
pdf bib
  • Hwaseong Lee, Eun Young Choi, Su-Mi Lee and Dong Hoon Lee.
    Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags.
    (SecPerU 2007, July 2007)
pdf bib
  • Dara J. Glasser and Kenneth W. Goodman and Norman G. Einspruch.
    Chips, tags and scanners: Ethical challenges for radio frequency identification.
    (Ethics and Information Technology, July 2007)
pdf bib
  • Basel Alomair, Loukas Lazos, and Radha Poovendran.
    Passive Attacks on a Class of Authentication Protocols for RFID.
    (ICISC, July 2007)
pdf bib
  • Luke Mirowski and Jacky Hartnett.
    Deckard: A System to Detect Change of RFID Tag Ownership.
    (IJCSNS, July 2007)
pdf bib
  • Claude Castelluccia and Mate Soos.
    Secret Shuffling: A Novel Approach to RFID Private Identification .
    (RFIDSec'07, July 2007)
pdf slides bib
  • Divyan Konidala, Zeen Kim, and Kwangjo Kim.
    A Simple and Cost-Effective RFID Tag-Reader Mutual Authentication Scheme.
    (RFIDSec'07, July 2007)
pdf slides bib
  • Santi Martinez, Magda Valls, Concepcio Roig, Francesc Giné and Josep Miret.
    An Elliptic Curve and Zero Knowledge Based Forward Secure RFID Protocol.
    (RFIDSec'07, July 2007)
pdf slides bib
  • Mike Burmester and Breno de Medeiros.
    Persistent Security for RFID.
    (RFIDSec'07, July 2007)
pdf slides bib
  • François Macé, François-Xavier Standaert, and Jean-Jacques Quisquater.
    ASIC Implementations of the Block Cipher SEA for Constrained Applications.
    (RFIDSec'07, July 2007)
pdf slides bib
  • Marc Girault, Loic Juniot, and Matthew Robshaw.
    The Feasibility of On-the-Tag Public Key Cryptography.
    (RFIDSec'07, July 2007)
pdf slides bib
  • Hee-Jin Chae, Daniel Yeager, Joshua Smith, and Kevin Fu.
    Maximalist Cryptography and Computation on the WISP UHF RFID Tag.
    (RFIDSec'07, July 2007)
pdf slides bib
  • Mihaly Barasz, Balazs Boros, Peter Ligeti, Krisztina Loja, Daniel Nagy.
    Breaking LMAP.
    (RFIDSec'07, July 2007)
pdf slides bib
  • Andrey Bogdanov.
    Attacks on the KeeLoq Block Cipher and Authentication Systems.
    (RFIDSec'07, July 2007)
pdf slides bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda.
    Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 standard.
    (RFIDSec'07, July 2007)
pdf slides bib
  • Daniel Holcom, Wayne Burleson, and Kevin Fu.
    Initial SRAM state as a Fingerprint and Source of True Random Numbers for RFID Tags.
    (RFIDSec'07, July 2007)
pdf slides bib
  • Jean Monnerat, Serge Vaudenay, and Martin Vuagnoux.
    About Machine-Readable Travel Documents.
    (RFIDSec'07, July 2007)
pdf slides bib
  • Ulrich Kaiser.
    UICE: A High-Performance Cryptographic Module for SoC and RFID Applications.
    (IACR ePrint, July 2007)
pdf bib
  • Dave Singelee And Bart Preneel.
    Distance Bounding in Noisy Environments.
    (ESAS 2007, July 2007)
pdf bib
  • Il Jung Kim, Eun Young Choi And Dong Hoon Lee.
    Secure Mobile RFID system against privacy and security problems.
    (SecPerU 2007, July 2007)
pdf bib
  • Weijia Wang, Yong Li, Lei Hu And Li Lu.
    Storage-awareness: RFID private authentication based on sparse tree.
    (SecPerU 2007, July 2007)
pdf bib
  • Gene Tsudik.
    A Family of Dunces: Trivial RFID Identification and Authentication Protocols.
    (PET, June 2007)
pdf bib
  • Gildas Avoine, Levente Buttyán, Tamás Holczer, and István Vajda.
    Group-based private authentication.
    (IEEE TSPUC 2007, June 2007)
pdf bib
  • Andreas Wallstabe and Hartmut Pohl.
    Implementing high-level Counterfeit Security using RFID and PKI.
    (RFID SysTech 2007, June 2007)
pdf slides bib
  • Jue-Sam Chou, Guey-Chuen Lee, Chung-Ju Chan.
    A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems.
    (IACR ePrint, June 2007)
pdf bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Arturo Ribagorda.
    Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.
    (SecPerU, June 2007)
pdf bib
  • Martin Halvac and Tomas Rosa.
    A Note on the Relay Attacks on e-passports: The Case of Czech e-passports.
    (IACR ePrint, June 2007)
pdf bib
  • Tristan Crispijn van Stijn.
    Analyzing RFID Authentication Protocols.
    (Master Thesis, May 2007)
pdf bib
  • Eleni Kosta, Martin Meints, Marit Hensen, and Mark Gasson.
    An analysis of security and privacy issues relating to RFID enabled ePassports.
    (IFIP SEC'07, May 2007)
pdf bib
  • Stéphane Lemieux and Adrian Tang.
    Clone Resistant Mutual Authentication for Low-Cost RFID Technology.
    (IACR ePrint, May 2007)
pdf bib
  • Maire McLoone and Matthew Robshaw.
    New Architectures for Low-Cost Public Key Cryptography on RFID Tags.
    (ISCAS'07, May 2007)
pdf bib
  • Tieyan Li, Guilin Wang.
    Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols.
    (IFIP SEC'07, May 2007)
pdf bib
  • Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri Penumarthi.
    MIXNET for Radio Frequency Identification.
    (IEEE Region 5 Technical Conf., April 2007)
pdf slides bib
  • Tom Karygiannis, Bernard Eydt, Greg Barber, Lynn Bunn and Ted Phillips.
    Guidelines for Securing Radio Frequency Identification (RFID) Systems.
    (NIST Special Publication, April 2007)
pdf bib
  • Tieyan Li, Robert H. Deng.
    Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol.
    (AReS'07, April 2007)
pdf bib
  • Andrea Soppera, Trevor Burbridge and Valentijn Broekhuizen.
    Trusted RFID Readers for Secure Multi-Party Services.
    (EU RFID Forum, March 2007)
pdf bib
  • Tri Van Le, Mike Burmester, and Breno de Medeiros.
    Universally Composable and Forward-secure RFID Authentication and Authenticated Key Exchange.
    (ASIACCS'07, March 2007)
pdf bib
  • Jason Reid, Juan Gonzalez Nieto, Tee Tang, and Bouchra Senadji.
    Detecting Relay Attacks with Timing Based Protocols.
    (ASIACCS'07, March 2007)
pdf bib
  • Yingjiu Li and Xuhua Ding.
    Protecting RFID Communications in Supply Chains.
    (ASIACCS'07, March 2007)
pdf bib
  • K. H. S. Sabaragamu Koralalage, Mohammed Reza Selim, Junichi Miura, Yuichi Goto, and Jingde Cheng.
    POP Method: An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism.
    (SAC '07, March 2007)No Keywords
pdf slides bib
  • Ari Juels and Stephen Weis.
    Defining Strong Privacy for RFID.
    (PerCom'07, March 2007)
pdf slides bib
  • Li Lu, Jinsong Han, Lei Hu, Yunhao Liu and Lionel Ni.
    Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
    (PerCom'07, March 2007)
pdf bib
  • Leonid Bolotnyy and Gabriel Robins.
    Physically Unclonable Function-Based Security and Privacy in RFID Systems.
    (PerCom'07, March 2007)
pdf slides bib
  • Chiu C. Tan and Bo Sheng and Qun Li.
    Serverless Search and Authentication Protocols for RFID.
    (PerCom'07, March 2007)
pdf bib
  • Jacek Cichon, Marek Klonowski, and Miroslaw Kutylowski.
    Privacy Protection in Dynamic Systems Based on RFID Tags.
    (PerSec'07, March 2007)
pdf slides bib
  • Benessa Defend, Kevin Fu and Ari Juels.
    Cryptanalysis of Two Lightweight RFID Authentication Schemes.
    (PerSec'07, March 2007)
pdf bib
  • Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls, and Ingrid Verbauwhede.
    Public-Key Cryptography for RFID-Tags.
    (PerSec'07, March 2007)
pdf bib
  • Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini and Angelo Spognardi.
    RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy.
    (PerSec'07, March 2007)
pdf bib
  • Yang Cui, Kazukuni Kobara, Kanta Matsuura and Hideki Imai.
    Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
    (PerSec'07, March 2007)
pdf bib
  • Thomas S. Heydt-Benjamin, Dan V. Bailey, Kevin Fu, Ari Juels, and Tom O'Hare.
    Vulnerabilities in First-Generation RFID-enabled Credit Cards.
    (FC'07, February 2007)
pdf bib
  • Jens-Peter Kaps, Gunnar Gaubatz and Berk Sunar.
    Cryptography on a Speck of Dust.
    (IEEE Computer, February 2007)
pdf bib
  • Hung-Yu Chien and Che-Hao Chen.
    Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards.
    (Computers Standards & Interfaces, February 2007)
pdf bib
  • Maire McLoone and Matthew Robshaw.
    Public Key Cryptography and RFID Tags.
    (CT-RSA, February 2007)
pdf bib
  • Tri Van Le, Mike Burmester, and Breno de Medeiros.
    Forward-secure RFID Authentication and Key Exchange.
    (IACR ePrint, February 2007)
pdf bib
  • Agusti Solanas, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, and Vanesa Daza.
    A Distributed Architecture for Scalable Private RFID Tag Identification.
    (Computer Networks, January 2007)
pdf bib
  • Serge Vaudenay and Martin Vuagnoux.
    About Machine-Readable Travel Documents.
    (ICS'07, 2007)
bib
  • Seongan Lim and Ikkwon Yie.
    Probabilistic privacy leakage from challenge-response RFID authentication protocols.
    (AIC'07, 2007)
pdf bib
  • Pablo Najera And Javier Lopez.
    RFID: Technological Issues and Privacy Concerns.
    (Auerbach Publications, 2007)
pdf bib

2006

  • Chae Hoon Lim and Taekyoung Kwon.
    Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer.
    (ICICS'06, December 2006)
pdf bib
  • Karsten Nohl, David Evans.
    Quantifying Information Leakage in Tree-Based Hash Protocols.
    (ICICS'06, December 2006)
pdf bib
  • Melanie R. Rieback, Georgi Gaydadjiev, Bruno Crispo, Rutger Hofman, Andrew S. Tanenbaum.
    A Platform for RFID Security and Privacy Administration.
    (USENIX/SAGE Large Installation System Administration conference - LISA'06, December 2006)
pdf bib
  • Karsten Nohl, David Evans.
    Quantifying Information Leakage in Tree-Based Hash Protocols.
    (Technical Report, December 2006)
pdf bib
  • Serge Vaudenay.
    RFID Privacy Based on Public-Key Cryptography (Abstract).
    (ICISC, November-December 2006, December 2006)
pdf bib
  • Christopher Bolan.
    The Lazarus Effect: Resurrecting Killed RFID Tags.
    (AISMC 2006, December 2006)
pdf bib
  • Bo Sun, Chung-Chih Li And Yang Xiao.
    A Lightweight Secure Solution for RFID.
    (GLOBECOM '06, December 2006)
pdf bib
  • Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee.
    HIGHT: A New Block Cipher Suitable for Low-Resource Device.
    (CHES 2006, November 2006)
pdf bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Arturo Ribagorda.
    EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID Tags.
    (OTM Federated Conferences and Workshop: IS Workshop, November 2006)
pdf bib
  • Martin Feldhofer And Christian Rechberger.
    A Case Against Currently Used Hash Functions in RFID Protocols.
    (OTM 2006, November 2006)No Keywords
pdf slides bib
  • Mikko Lehtonen, Thorsten Staake, Florian Michahelles, and Elgar Fleisch.
    Strengthening the Security of Machine Readable Documents by Combining RFID and Optical Memory Devices.
    (Ambient Intelligence Developments Conference, September 2006)
pdf bib
  • Jonathan Katz and Adam Smith.
    Analyzing the HB and HB+ Protocols in the ``Large Error'' Case.
    (IACR ePrint, September 2006)
pdf bib
  • Daniel Bailey and Ari Juels.
    Shoehorning Security into the EPC Standard.
    (SCN, September 2006)
pdf bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Arturo Ribagorda.
    M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags.
    (International Conference on Ubiquitous Intelligence and Computing - UIC'06, September 2006)
pdf bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, Arturo Ribagorda.
    RFID Systems: A Survey on Security Threats and Proposed Solutions.
    (06, September 2006)
pdf bib
  • Julien Bringer and Hervé Chabanne.
    On the Wiretap Channel Induced by Noisy Tags.
    (European Workshop on Security and Privacy in Ad hoc and Sensor Networks - ESAS, September 2006)
pdf bib
  • Selma Boumerdassi, Papa Kane Diop, Eric Renault And Anne Wei.
    T2MAP: A Two-Message Mutual Authentication Protocol for Low-Cost RFID Sensor Networks.
    (VTC 2006, September 2006)
pdf bib
  • Mike Burmester, Tri van Le and Breno de Medeiros.
    Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols.
    (SecureComm, August 2006)
pdf bib
  • Daesung Kwon, Daewan Han, Jooyoung Lee, Yongjin Yeom.
    Vulnerability of an RFID Authentication Protocol Proposed at SecUbiq 2005.
    (Secubiq, August 2006)
pdf bib
  • Youngjoon Seo and Kwangjo Kim.
    Scalable and Untraceable Authentication Protocol for RFID.
    (Secubiq, August 2006)
bib
  • Dario Carluccio, Kerstin Lemke, Christof Paar And Ahmad-Reza Sadeghi.
    E-passport: the global traceability or how to feel like an UPS package.
    (WISA'06, August 2006)
bib
  • Timo Kasper.
    Embedded Security Analysis of RFID Devices.
    (Master Thesis, July 2006)
pdf bib
  • Salvatore Bocchetti.
    Security and Privacy in RFID Protocols.
    (Master Thesis, July 2006)
pdf bib
  • Mike Burmester, Tri van Le and Breno de Medeiros.
    Towards Provable Security for Ubiquitous Applications.
    (Australasian Conference on Information Security and Privacy - ACISP, July 2006)
pdf bib
  • Ivan Damgard and Michael Ostergaard.
    RFID Security: Tradeoffs between Security and Efficiency.
    (IACR ePrint, July 2006)
pdf bib
  • Lejla Batina and Jorge Guajardo and Tim Kerins and Nele Mentens and Pim Tuyls and Ingrid Verbauwhede.
    An Elliptic Curve Processor Suitable For RFID-Tags.
    (IACR ePrint, July 2006)
pdf bib
  • Axel Poschmann, Gregor Leander, Kai Schramm And Christof Paar.
    A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications.
    (RFIDSec'06, July 2006)
pdf slides bib
  • Ernst Haselsteiner And Klemens Breitfuss.
    Security in Near Field Communication (NFC).
    (RFIDSec'06, July 2006)
pdf slides bib
  • Jorge Munilla, Andres Ortiz And Alberto Peinado.
    Distance Bounding Protocols with Void-Challenges for RFID.
    (RFIDSec'06, July 2006)
slides bib
  • Kazuo Sakiyama, Lejla Batina, Nele Mentens, Bart Preneel And Ingrid Verbauwhede.
    Small-Footprint ALU for Public-Key Processors for Pervasive Security.
    (RFIDSec'06, July 2006)
pdf slides bib
  • Sandeep Kumar And Christof Paar.
    Are Standards Compliant Elliptic Curve Cryptosystems Feasible on RFID?.
    (RFIDSec'06, July 2006)
pdf slides bib
  • Mikko Lehtonen, Thorsten Staake, Florian Michahelles And Elgar Fleisch.
    From Identification to Authentication - A Review of RFID Product Authentication Techniques.
    (RFIDSec'06, July 2006)
pdf bib
  • Pengyuan Yu, Patrick Schaumont And Dong Ha.
    Securing RFID with Ultra-Wideband Modulation.
    (RFIDSec'06, July 2006)
pdf slides bib
  • Andrea Soppera, Trevor Burbridge.
    Off by Default - RAT: RFID Acceptor Tag.
    (Workshop on RFID Security, July 2006)
bib
  • Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador And Arturo Ribagorda.
    LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags.
    (RFIDSec'06, July 2006)
pdf slides bib
  • Dario Carluccio, Timo Kasper And Christof Paar.
    Implementation Details of a Multi Purpose ISO 14443 RFID-Tool.
    (RFIDSec'06, July 2006)
pdf bib
  • Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls And Ingrid Ver- bauwhede.
    Public-Key Cryptography for RFID-Tags.
    (RFIDSec'06, July 2006)
pdf slides bib
  • Miyako Ohkubo and Koutarou Suzuki.
    Forward Secure RFID Privacy Protection Scheme with Restricted Traceability.
    (ACNS, June 2006)
bib
  • Thomas S. Heydt-Benjamin, Hee-Jin Chae, Benessa Defend, and Kevin Fu.
    Privacy for Public Transportation.
    (Workshop on Privacy Enhancing Technologies - PET, June 2006)
pdf bib
  • Levente Buttyan, Tamas Holczer and Istvan Vajda.
    Optimal Key-Trees for Tree-Based Private Authentication.
    (Workshop on Privacy Enhancing Technologies - PET, June 2006)
bib
  • Piramuthu, Selwyn.
    HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication.
    (CollECTeR Europe Conference, June 2006)
pdf bib
  • Piramuthu, Selwyn.
    On Existence Proofs for Multiple RFID Tags.
    (Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, June 2006)
pdf bib
  • Christy Chatmon and Tri van Le, and Mike Burmester.
    Secure Anonymous RFID Authentication Protocols.
    (Technical Report, June 2006)
pdf bib
  • Julien Bringer, Hervé Chabanne, and Emmanuelle Dottax.
    HB++: a Lightweight Authentication Protocol Secure against Some Attacks.
    (Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, June 2006)
bib
  • Nimish Vartak.
    Protecting the Privacy of RFID tags.
    (Master Thesis, May 2006)
pdf bib
  • Jonathan Katz and Ji Sun Shin.
    Parallel and Concurrent Security of the HB and HB+ Protocols.
    (Eurocrypt'06, May 2006)
pdf bib
  • Kirk Wong, Patrick Hui, and Allan Chan.
    Cryptography and authentication on RFID passive tags for apparel products.
    (Journal Computers in Industry, May 2006)
pdf bib
  • Jeong Su Park, Su Mi Lee, Eun Young Choi and Dong Hoon Lee.
    Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System.
    (International Conference on Computational Science and its Applications - ICCSA'06, May 2006)
pdf bib
  • Wonjoon Choi and Byeong-hee Roh.
    Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms.
    (International Conference on Computational Science and its Applications - ICCSA'06, May 2006)
pdf bib
  • Jia Zhai, Chang Mok Park, Gi-Nam Wang.
    Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure.
    (International Conference on Computational Science and its Applications - ICCSA'06, May 2006)
pdf bib
  • Gerhard P. Hancke.
    Practical Attacks on Proximity Identification Systems (Short Paper).
    (IEEE S&P, May 2006)
pdf slides bib
  • Stephen Weis.
    New Foundations for Efficient Authentication, Commutative Cryptography, and Private Disjointness Testing.
    (PhD Thesis, May 2006)
pdf bib
  • Arjun Agarwal and Mala Mitra.
    RFID: Promises and Problems.
    (PES Institute of Technology, April 2006)
pdf bib
  • Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, and Ronny Wichers Schreur.
    Crossing Borders: Security and Privacy Issues of the European e-Passport.
    (IWSEC, April 2006)
pdf bib
  • Soo-Cheol Kim, Sang-Soo Yeo, Sung Kwon Kim.
    MARP: Mobile Agent for RFID Privacy Protection.
    (CARDIS'06, April 2006)
pdf bib
  • Benoit Calmels, Sébastien Canard, Marc Girault, and Hervé Sibert.
    Low-cost cryptography for privacy in RFID systems.
    (CARDIS'06, April 2006)
bib
  • Claude Castelluccia and Gildas Avoine.
    Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags.
    (CARDIS'06, April 2006)
pdf bib
  • Tobias Lohmann, Matthias Schneider, and Christoph Ruland.
    Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags.
    (CARDIS'06, April 2006)
bib
  • John Halamka, Ari Juels, Adam Stubblefield, and Jonathan Westhues.
    The Security Implications of VeriChip Cloning.
    (Manuscript in submission, March 2006)
pdf bib
  • Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum.
    Is Your Cat Infected with a Computer Virus?.
    (Pervasive Computing and Communications - PerCom'06, March 2006)
pdf bib
  • Gene Tsudik.
    YA-TRAP: Yet Another Trivial RFID Authentication Protocol.
    (International Conference on Pervasive Computing and Communications - PerCom'06, March 2006)
pdf bib
  • Tassos Dimitriou.
    A Secure and Efficient RFID Protocol that could make Big Brother (partially) Obsolete.
    (International Conference on Pervasive Computing and Communications - PerCom'06, March 2006)
pdf bib
  • Inseop Kim, Byunggil Lee, and Howon Kim.
    Privacy Protection based on User-defined Preferences in RFID System.
    (ICACT'06, February 2006)
pdf bib
  • Ari Juels.
    RFID Security and Privacy: A research Survey.
    (IEEE Journal on Selected Areas in Communications, February 2006)
pdf bib
  • Ilan Kirschenbaum and Avishai Wool.
    How to Build a Low-Cost, Extended-Range RFID Skimmer.
    (IACR ePrint, February 2006)
pdf bib
  • Pim Tuyls and Lejla Batina.
    RFID-Tags for Anti-Counterfeiting.
    (Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, February 2006)
pdf bib
  • Pasin Israsena.
    Securing ubiquitous and low-cost RFID using tiny encryption algorithm.
    (Wireless Pervasive Computing, January 2006)
pdf bib
  • Zhaoyu Liu and Dichao Peng.
    True random number generator in RFID systems against traceability.
    (Consumer Communications and Networking Conference, January 2006)
pdf bib
  • Sangshin Lee, Tomoyuki Asano, and Kwangjo Kim.
    RFID Mutual Authentication Scheme based on Synchronized Secret Information.
    (Symposium on Cryptography and Information Security, January 2006)
pdf slides bib
  • Dang Nguyen Duc, Jaemin Park, Hyunrok Lee, and Kwangjo Kim.
    Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning.
    (Symposium on Cryptography and Information Security, January 2006)
pdf bib
  • Shah Sheetal.
    Technical analysis of security mechanisms used in RFID E-passport, related threats, security and privacy issues.
    (Misc, 2006)
pdf bib
  • Stefan Dahl.
    Anonymous Car Toll Payments using RFID Tags.
    (Master Thesis, 2006)
pdf bib
  • Yongje Choi, Mooseop Kim, Taesung Kim and Howon Kim.
    Low power implementation of SHA-1 algorithm for RFID system.
    (ISCE'06, 2006)
pdf bib
  • David Molnar.
    Security and Privacy in Two RFID Deployments, With New Methods For Private Authentication and RFID Pseudonyms.
    (Master Thesis, 2006)
pdf bib
  • Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum.
    The Evolution of RFID Security.
    (IEEE Pervasive Computing, 2006)
pdf bib

2005

  • Sangshin Lee.
    Mutual Authentication of RFID System using Synchronized Secret Information.
    (Master Thesis, December 2005)
pdf bib
  • Xiaolan Zhang and Brian King.
    Modeling RFID Security.
    (CISC, December 2005)
pdf bib
  • Gildas Avoine.
    Cryptography in Radio Frequency Identification and Fair Exchange Protocols.
    (PhD Thesis, December 2005)
pdf slides bib
  • Eun Young Choi, Su Mi Lee, and Dong Hoon Lee.
    Efficient RFID Authentication protocol for Ubiquitous Computing Environment.
    (International Workshop on Security in Ubiquitous Computing Systems, December 2005)
pdf bib
  • Sindhu Karthikeyan, Mikhail Nesterenko.
    RFID Security without Extensive Cryptography.
    (SASN, November 2005)
pdf bib
  • Yong Ki Lee and Ingrid Verbauwhede.
    Secure and Low-cost RFID Authentication Protocols.
    (Adaptive Wireless Networks - AWiN, November 2005)
pdf bib
  • Yasunobu Nohara, Sozo Inoue, Kensuke Baba, Hiroto Yasuura.
    Quantitative Evaluation of Unlinkable ID Matching Schemes.
    (Workshop on Privacy in the Electronic Society - WPES, November 2005)
pdf bib
  • Günter Karjoth and Paul Moskowitz.
    Disabling RFID Tags with Visible Confirmation: Clipped Tags Are Silenced.
    (Workshop on Privacy in the Electronic Society - WPES, November 2005)No Keywords
pdf bib
  • David Molnar, Andrea Soppera, David Wagner.
    Privacy for RFID Through Trusted Computing.
    (Workshop on Privacy in the Electronic Society - WPES, November 2005)
pdf bib
  • Giuseppe Ateniese, Jan Camenisch, and Breno de Medeiros.
    Untraceable RFID Tags via Insubvertible Encryption.
    (Conference on Computer and Communications Security - ACM CCS, November 2005)
pdf bib
  • Martin Feldhofer, Johannes Wolkerstorfer and Vincent Rijmen.
    AES Implementation on a Grain of Sand.
    (IEE Proceedings on Information Security,, October 2005)
pdf bib
  • Andrea Soppera and Trevor Burbridge.
    Wireless identification - privacy and security.
    (BT Technology Journal, October 2005)
pdf bib
  • Henri Gilbert, Matthew Robshaw And Hervé Sibert.
    An Active Attack Against HB$^+$ -- A provably Secure Lightweight Authentication Protocol.
    (IET Electronics Letters, October 2005)
bib
  • Gildas Avoine.
    Adversary Model for Radio Frequency Identification.
    (Technical Report LASEC-REPORT-2005-001, EPFL, Lausanne, Switzerland, September 2005)
pdf bib
  • Xiaolan Zhang and Brian King.
    Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting.
    (Information Security Conference, September 2005)
pdf bib
  • Tassos Dimitriou.
    A Lightweight RFID Protocol to protect against Traceability and Cloning attacks.
    (SecureComm, September 2005)
pdf bib
  • Gerhard P. Hancke and Markus Kuhn.
    An RFID distance bounding protocol.
    (SecureComm, September 2005)
pdf slides bib
  • Ari Juels, David Molnar, and David Wagner.
    Security and Privacy Issues in E-passports.
    (SecureComm, September 2005)
pdf bib
  • Ziv Kfir and Avishai Wool.
    Picking virtual pockets using relay attacks on contactless smartcard systems.
    (SecureComm, September 2005)
pdf bib
  • Xingxin (Grace) Gao, Zhe (Alex) Xiang, Hao Wang, Jun Shen, Jian Huang, and Song Song.
    An Approach to Security and Privacy of RFID System for Supply Chain.
    (Conference on E-Commerce Technology for Dynamic E-Business, September 2005)
pdf bib
  • Chae Hoon Lim and Tymur Korkishko.
    mCrypton - A Lightweight Block Cipher For Security of Low-Cost RFID Tags and Sensors.
    (WISA'05, August 2005)
bib
  • Günter Karjoth and Paul Moskowitz.
    Disabling RFID Tags with Visible Confirmation: Clipped Tags Are Silenced.
    (Research Report RC 23710, IBM Zurich, Switzerland, August 2005)
pdf bib
  • Gildas Avoine, Etienne Dysli, and Philippe Oechslin.
    Reducing Time Complexity in RFID Systems.
    (Selected Areas in Cryptography, August 2005)
pdf slides bib
  • David Molnar, Andrea Soppera, and David Wagner.
    A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.
    (Selected Areas in Cryptography, August 2005)
pdf bib
  • Ari Juels and Stephen Weis.
    Authenticating Pervasive Devices with Human Protocols.
    (Crypto, August 2005)
pdf bib
  • Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, and Michael Szydlo.
    Security Analysis of a Cryptographically-Enabled RFID Device.
    (USENIX Security Symposium, July-August 2005, August 2005)
pdf bib
  • Dario Carluccio, Kerstin Lemke And Christof Paar.
    Electromagnetic Side Channel Analysis of a Contactless Smart Card: First Results.
    (Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005)
pdf slides bib
  • Hervé Chabanne And Guillaume Fumaroli.
    Noisy Cryptographic Protocols for Low Cost RFID Tags.
    (Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005)
pdf slides bib
  • Sandra Dominikus, Elisabeth Oswald And Martin Feldhofer.
    Symmetric Authentication for RFID Systems in Practice.
    (Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005)
pdf slides bib
  • David Molnar, Andrea Soppera And David Wagner.
    A Scalable, Delegatable, Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.
    (Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005)
pdf slides bib
  • Johannes Wolkerstorfer.
    Is Elliptic-Curve Cryptography Suitable to Secure RFID Tags?.
    (Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005)
pdf slides bib
  • Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren And Kwangjo Kim.
    Mutual Authentication Protocol for Low-Cost RFID.
    (Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005)
pdf slides bib
  • Stefan Stadlober.
    An Evaluation of Security Threats and Countermeasures in Distributed RFID Infrastructures.
    (Master Thesis, July 2005)
pdf bib
  • Gwo-Ching Chang.
    A Feasible Security Mechanism for Low Cost RFID Tags.
    (ICMB'05, July 2005)
pdf bib
  • Benjamin Fabian, Oliver Günther, and Sarah Spiekermann.
    Security Analysis of the Object Name Service for RFID.
    (Security, Privacy and Trust in Pervasive and Ubiquitous Computing, July 2005)
pdf bib
  • Martin Feldhofer, Manfred Aigner, and Sandra Dominikus.
    An Application of RFID Tags using Secure Symmetric Authentication.
    (Security, Privacy and Trust in Pervasive and Ubiquitous Computing, July 2005)
bib
  • Jeonil Kang and Daehun Nyang.
    RFID Authentication Protocol with Strong Resistance against Traceability and Denial of Service Attacks.
    (European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, July 2005)
pdf bib
  • Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, and Dongho Won.
    RFID System with Fairness within the Framework of Security and Privacy.
    (European Workshop on Security and Privacy in Ad hoc and Sensor Networks, July 2005)
pdf bib
  • Sang-Soo Yeo and Sung-Kwon Kim.
    Scalable and Flexible Privacy Protection Scheme for RFID Systems.
    (European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, July 2005)
pdf bib
  • Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum.
    RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management.
    (Australasian Conference on Information Security and Privacy - ACISP, July 2005)
pdf bib
  • Sarah Spiekermann.
    Perceived Control: Scales for Privacy in Ubiquitous Computing Environments.
    (Conference on User Modeling, July 2005)
pdf bib
  • Ari Juels, Paul Syverson, and Dan Bailey.
    High-Power Proxies for Enhancing RFID Privacy and Utility.
    (Workshop on Privacy Enhancing Technologies - PET, May-June 2005, June 2005)
pdf slides bib
  • Simson Garfinkel, Ari Juels, and Ravi Pappu.
    RFID Privacy: An Overview of Problems and Proposed Solutions.
    (IEEE Security and Privacy, May-June 2005, June 2005)
pdf bib
  • Laurent Bussard And Walid Bagga.
    Distance-bounding proof of knowledge to avoid real-time attacks.
    (Security and Privacy in the Age of Ubiquitous Computing, June 2005)
pdf bib
  • Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum.
    Uniting Legislation with RFID Privacy-Enhancing Technologies.
    (Conference on Security and Protection of Information, May 2005)
pdf bib
  • Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee, and Jong In Lim.
    Efficient Authentication for Low-Cost RFID Systems.
    (International Conference on Computational Science and its Applications - ICCSA'05, May 2005)
pdf bib
  • Shingo Kinoshita, Miyako Ohkubo, Fumitaka Hoshino, Gembu Morohashi, Osamu Shionoiri, and Atsushi Kanai.
    Privacy Enhanced Active RFID Tag.
    (International Workshop on Exploiting Context Histories in Smart Environments, May 2005)
pdf bib
  • Sarah Spiekermann and Holger Ziekow.
    RFID: a 7-point plan to ensure privacy.
    (European Conference on Information Systems, May 2005)No Keywords
bib
  • Gaurav S. Kc and Paul A. Karger.
    Security and Privacy Issues in Machine Readable Travel Documents.
    (IBM Research Report, April 2005)
pdf bib
  • Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum.
    Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags.
    (International Workshop on Security Protocols, April 2005)
pdf bib
  • John Ayoade, Osamu Takizawa, and Koji Nakao.
    A prototype System of the RFID Authentication Processing Framework.
    (International Workshop in Wireless Security Technologies, April 2005)
pdf bib
  • Rakesh Kumar and Riti Chatterjee.
    Shaping Ubiquity for the developing World.
    (International Telecommunications Union (ITU), Workshop on Ubiquitous Network Societies, April 2005)
slides bib
  • Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won.
    Challenge-Response based RFID Authentication Protocol for Distributed Database Environment.
    (International Conference on Security in Pervasive Computing, April 2005)
pdf bib
  • Manfred Aigner and Martin Feldhofer.
    Secure Symmetric Authentication for RFID Tags.
    (Telecommunication and Mobile Computing, March 2005)
pdf bib
  • Gildas Avoine and Philippe Oechslin.
    A Scalable and Provably Secure Hash-Based RFID Protocol.
    (PerSec, March 2005)
pdf slides bib
  • Thorsten Staake, Frédéric Thiesse, and Elgar Fleisch.
    Extending the EPC Network - The Potential of RFID in Anti-Counterfeiting.
    (Symposium on Applied Computing - SAC, March 2005)
pdf slides bib
  • Ari Juels.
    Strengthening EPC Tags Against Cloning.
    (manuscript, March 2005)
pdf bib
  • Stephen Weis.
    Security Parallels Between People and Pervasive Devices.
    (Workshop on Pervasive Computing and Communications Security - PerSec, March 2005)
pdf bib
  • Junichiro Saito and Kouichi Sakurai.
    Grouping Proof for RFID Tags.
    (Conference on Advanced Information Networking and Applications, March 2005)
pdf bib
  • Gildas Avoine and Philippe Oechslin.
    RFID Traceability: A Multilayer Problem.
    (FC'05, February-March 2005, March 2005)
pdf slides bib
  • Ari Juels.
    RFID Privacy: A Technical Primer for the Non-Technical Reader.
    (Book Chapter, Draft, February 2005)No Keywords
pdf bib
  • Gerhard P. Hancke.
    A Practical Relay Attack on ISO 14443 Proximity Cards.
    (Manuscript, February 2005)
pdf bib

2004

  • Jeongkyu Yang.
    Security and Privacy on Authentication Protocol for Low-cost Radio Frequency Identification.
    (Master Thesis, December 2004)
bib
  • Thomas Hjorth.
    Supporting Privacy in RFID Systems.
    (Master Thesis, December 2004)
pdf bib
  • Heiko Knospe and Hartmut Pohl.
    RFID Security.
    (Information Security Technical Report, November-December 2004, December 2004)
pdf bib
  • Christian Floerkemeier, Roland Schneider, and Marc Langheinrich.
    Scanning with a Purpose -- Supporting the Fair Information Principles in RFID Protocols.
    (International Symposium on Ubiquitous Computing Systems, November 2004)
pdf bib
  • Stephan J. Engberg, Morten B. Harning, and Christian Damsgaard Jensen.
    Zero-knowledge Device Authentication: Privacy and Security Enhanced RFID preserving Business Value and Consumer Convenience.
    (Conference on Privacy, Security and Trust, October 2004)
pdf slides bib
  • Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Laura Quilter, Jennifer Urban, and David Wagner.
    Radio Frequency Identification and Privacy with Information Goods.
    (Workshop on Privacy in the Electronic Society - WPES, October 2004)
bib
  • Jan E. Hennig, Peter B. Ladkin, and Bernd Sieker.
    Privacy Enhancing Technology Concepts for RFID Technology Scrutinised.
    (Research Report, October 2004)
pdf bib
  • Ari Juels and John Brainard.
    Soft Blocking: Flexible Blocker Tags on the Cheap.
    (Workshop on Privacy in the Electronic Society - WPES, October 2004)
pdf bib
  • David Molnar and David Wagner.
    Privacy and Security in Library RFID: Issues, Practices, and Architectures.
    (Conference on Computer and Communications Security - ACM CCS, October 2004)
pdf bib
  • Ari Juels.
    Minimalist Cryptography for Low-Cost RFID Tags.
    (International Conference on Security in Communication Networks - SCN, September 2004)
pdf bib
  • Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita.
    Efficient Hash-Chain Based RFID Privacy Protection Scheme.
    (International Conference on Ubiquitous Computing, Workshop Privacy, September 2004)
bib
  • Damith Ranasinghe, Daniel Engels, and Peter Cole.
    Low-Cost RFID Systems: Confronting Security and Privacy.
    (Auto-ID Labs Research Workshop, September 2004)
pdf bib
  • Damith Ranasinghe, Daniel Engels, and Peter Cole.
    Security and Privacy: Modest Proposals for Low-Cost RFID Systems.
    (Auto-ID Labs Research Workshop, September 2004)
pdf bib
  • Gildas Avoine.
    Privacy Issues in RFID Banknote Protection Schemes.
    (CARDIS'04, August 2004)
pdf slides bib
  • Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer.
    Strong Authentication for RFID Systems Using the AES Algorithm.
    (CHES, August 2004)
pdf bib
  • Kenneth P. Fishkin, Sumit Roy, and Bing Jiang.
    Some Methods for Privacy in RFID Communication.
    (European Workshop on Security in Ad-hoc and Sensor Networks, August 2004)
pdf bib
  • Junichiro Saito, Jae-Cheol Ryou, Kouichi Sakurai.
    Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags.
    (EUC'04, August 2004)
pdf bib
  • Martin Feldhofer.
    An Authentication Protocol in a Security Layer for RFID Smart Tags.
    (IEEE Mediterranean Electrotechnical Conference - MELECON, May 2004)
bib
  • Dirk Henrici and Paul Müller.
    Tackling Security and Privacy Issues in Radio Frequency Identification Devices.
    (Pervasive Computing, April 2004)
pdf bib
  • Sarah Spiekermann and Oliver Berthold.
    Maintaining privacy in RFID enabled environments - Proposal for a disable-model.
    (Workshop on Security and Privacy, Conference on Pervasive Computing, April 2004)
pdf bib
  • Dirk Henrici and Paul Müller.
    Hash-Based Enhancement of Location Privacy For Radio-Frequency Identification Devices Using Varying Identifiers.
    (Workshop on Pervasive Computing and Communications Security - PerSec, March 2004)
pdf bib
  • Ari Juels.
    "Yoking-Proofs" for RFID Tags.
    (Workshop on Pervasive Computing and Communications Security - PerSec, March 2004)
pdf bib
  • Philippe Golle, Markus Jakobsson, Ari Juels, and Paul Syverson.
    Universal Re-Encryption for Mixnets.
    (The Cryptographers' Track at the RSA Conference - CT-RSA, February 2004)
pdf bib

2003

  • Sozo Inoue and Hiroto Yasuura.
    RFID Privacy Using User-controllable Uniqueness.
    (RFID Privacy Workshop, November 2003)
pdf slides bib
  • Rakesh Kumar.
    Interaction of RFID Technology and Public Policy.
    (RFID Privacy Workshop, November 2003)
pdf bib
  • Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita.
    Cryptographic Approach to ``Privacy-Friendly'' Tags.
    (RFID Privacy Workshop, November 2003)
pdf slides bib
  • Toshiharu Ishikawa, Yukiko Yumoto, Michio Kurata, Makoto Endo, Shingo Kinoshita, Fumitaka Hoshino, Satoshi Yagi, and Masatoshim Nomachi.
    Applying Auto-ID to the Japanese Publication Business.
    (Auto-ID Center White Paper, October 2003)
bib
  • Ari Juels, Ronald Rivest, and Michael Szydlo.
    The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy.
    (Conference on Computer and Communications Security - ACM CCS, October 2003)
pdf slides bib
  • István Vajda and Levente Buttyán.
    Lightweight authentication protocols for low-cost RFID tags.
    (Workshop on Security in Ubiquitous Computing, October 2003)
pdf bib
  • Stephen Weis.
    Security and Privacy in Radio-Frequency Identification Devices.
    (Master Thesis, May 2003)
pdf bib
  • Stephen Weis, Sanjay Sarma, Ronald Rivest, and Daniel Engels.
    Security and privacy aspects of low-cost radio frequency identification systems.
    (International Conference on Security in Pervasive Computing, March 2003)
pdf bib
  • Ari Juels and Ravikanth Pappu.
    Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.
    (FC'03, January 2003)
pdf slides bib
  • Sanjay Sarma, Stephen Weis, and Daniel Engels.
    Radio-frequency identification: security risks and challenges.
    (Cryptobytes, RSA Laboratories, Spring 2003, 2003)
pdf bib
  • Martin Feldhofer.
    A Proposal for Authentication Protocol in a Security Layer for RFID Smart Tags.
    (Stiftung Secure Information and Communication Technologies SIC, 2003)
pdf bib

2002

  • Sanjay Sarma, Stephen Weis, and Daniel Engels.
    RFID systems and security and privacy implications.
    (Cryptographic Hardware and Embedded Systems - CHES, August 2002)
pdf slides bib
"By default, pdf files are not hosted on the server due to copyright restrictions. We accept to host them when the author(s) explicitly requests us to do so. By requesting us to put his file on our server, the author(s) implicitly asserts that this action is not prohibited by any copyright agreement, law, or regulation".