


default search action
6th RFIDSec 2010: Istanbul, Turkey
- Siddika Berna Örs Yalçin:

Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6370, Springer 2010, ISBN 978-3-642-16821-5
Invited Talk 1
- Ari Juels:

The Physical Basis of RFID Security. 1
Session 1
- Nitesh Saxena, Jonathan Voris:

Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model. 2-21 - Julio César Hernández Castro

, Pedro Peris-Lopez
, Raphael C.-W. Phan
, Juan M. Estévez-Tapiador
:
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol. 22-34 - Lishoy Francis, Gerhard P. Hancke

, Keith Mayes, Konstantinos Markantonakis
:
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones. 35-49 - Gildas Avoine, Xavier Carpent

, Benjamin Martin:
Strong Authentication and Strong Integrity (SASI) Is Not That Strong. 50-64
Invited Talk 2
- Serge Vaudenay:

Privacy Models for RFID Schemes. 65
Session 2
- Junfeng Fan, Jens Hermans, Frederik Vercauteren

:
On the Claimed Privacy of EC-RAC III. 66-74 - Ton van Deursen, Sasa Radomirovic

:
EC-RAC: Enriching a Capacious RFID Attack Collection. 75-90 - Kurt Dietrich:

Anonymous RFID Authentication Using Trusted Computing Technologies. 91-102 - Gildas Avoine, Benjamin Martin, Tania Martin:

Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly. 103-122
Invited Talk 3
- Pim Tuyls:

Hardware Intrinsic Security. 123
Session 3
- Florian Kerschbaum, Nina Oertel:

Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting. 124-137 - Gildas Avoine, Iwen Coisel, Tania Martin:

Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols. 138-157 - Frederik Armknecht

, Liqun Chen
, Ahmad-Reza Sadeghi, Christian Wachsmann:
Anonymous Authentication for RFID Systems. 158-175 - Shin'ichiro Matsuo, Le Trieu Phong, Miyako Ohkubo, Moti Yung:

Leakage-Resilient RFID Authentication with Forward-Privacy. 176-188
Session 4
- Michael Hutter, Martin Feldhofer, Thomas Plos:

An ECDSA Processor for RFID Authentication. 189-202 - Gerhard de Koning Gans, Flavio D. Garcia:

Towards a Practical Solution to the RFID Desynchronization Problem. 203-219
Session 5
- Orhun Kara

, Süleyman Kardas, Muhammed Ali Bingöl
, Gildas Avoine:
Optimal Security Limits of RFID Distance Bounding Protocols. 220-238 - Rolando Trujillo-Rasua

, Benjamin Martin, Gildas Avoine:
The Poulidor Distance-Bounding Protocol. 239-257 - Elif Bilge Kavun

, Tolga Yalçin
:
A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications. 258-269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














