


default search action
RFIDSec Asia 2013: Guangzhou, China
- Changshe Ma, Jian Weng:
Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop Proceedings, Guangzhou, China, November 27, 2013. Cryptology and Information Security Series 11, IOS Press 2013, ISBN 978-1-61499-327-8 - Nan Li
, Yi Mu, Willy Susilo
, Fuchun Guo
, Vijay Varadharajan
:
On RFID Authentication Protocols with Wide-Strong Privacy. 3-16 - Marek Klonowski, Miroslaw Kutylowski, Piotr Syga
:
Chameleon RFID and Tracking Prevention. 17-29 - Shu Cheng
, Vijay Varadharajan
, Yi Mu, Willy Susilo
:
A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation. 31-43 - Roel Peeters
, Jens Hermans, Junfeng Fan:
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication. 45-56 - Fei Huo, Chouchang Yang, Guang Gong, Radha Poovendran
:
A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power. 57-68 - Roy Fisher, Gerhard P. Hancke
:
SSL Usage in Commercial Internet of Things Platforms. 69-82 - Shugo Mikami, Dai Watanabe, Kazuo Sakiyama:
A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications. 83-94 - Xinxin Fan, Guang Gong:
Securing NFC with Elliptic Curve Cryptography - Challenges and Solutions. 97-106 - Raja Naeem Akram
, Konstantinos Markantonakis, Keith Mayes:
Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions. 107-121 - Weijian Li, Shaohua Tang, Daojing He
:
A Survey of Side Channel Attacks on MPKCs potential for RFID. 123-131

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.