


default search action
7th RFIDSec 2011: Amherst, MA, USA
- Ari Juels, Christof Paar:
RFID. Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7055, Springer 2012, ISBN 978-3-642-25285-3 - Zheng Gong, Svetla Nikova, Yee Wei Law
:
KLEIN: A New Family of Lightweight Block Ciphers. 1-18 - Daniel W. Engels, Markku-Juhani O. Saarinen
, Peter Schweitzer, Eric M. Smith:
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm. 19-31 - Christian Pendl, Markus Pelnar, Michael Hutter:
Elliptic Curve Cryptography on the WISP UHF RFID Tag. 32-47 - Alessandro Barenghi
, Cédric Hocquet, David Bol, François-Xavier Standaert
, Francesco Regazzoni
, Israel Koren:
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation. 48-60 - Timo Kasper, David F. Oswald
, Christof Paar:
Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation. 61-77 - Süleyman Kardas, Mehmet Sabir Kiraz
, Muhammed Ali Bingöl
, Hüseyin Demirci
:
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions. 78-93 - Mohammad Reza Sohizadeh Abyaneh:
Security Analysis of Two Distance-Bounding Protocols. 94-107 - George T. Amariucai, Clifford Bergman
, Yong Guan:
An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID. 108-126 - Qi Chai, Guang Gong:
BUPLE: Securing Passive RFID Communication through Physical Layer Enhancements. 127-146 - Albert Fernàndez-Mir, Rolando Trujillo-Rasua
, Jordi Castellà-Roca
, Josep Domingo-Ferrer
:
A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation. 147-162 - Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
:
ROTIV: RFID Ownership Transfer with Issuer Verification. 163-182 - Lejla Batina, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede
:
Hierarchical ECC-Based RFID Authentication Protocol. 183-201

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.