


default search action
10th RFIDSec 2014: Oxford, UK
- Nitesh Saxena, Ahmad-Reza Sadeghi:
Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8651, Springer 2014, ISBN 978-3-319-13065-1 - Frederik Armknecht
, Matthias Hamann, Vasily Mikhalev:
Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts. 1-18 - Lejla Batina, Jens Hermans, Jaap-Henk Hoepman, Anna Krasnova:
High-Speed Dating Privacy-Preserving Attribute Matching for RFID. 19-35 - Rui Figueiredo, André Zúquete
, Tomás Oliveira e Silva
:
Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags. 36-53 - Hannes Groß, Erich Wenger, Honorio Martín
, Michael Hutter:
PIONEER - a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag. 54-73 - Chitra Javali, Girish Revadigar, Lavy Libman, Sanjay Jha
:
SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks. 74-89 - Javad Alizadeh, Hoda Alkhzaimi
, Mohammad Reza Aref, Nasour Bagheri
, Praveen Gauravaram, Abhishek Kumar, Martin M. Lauridsen, Somitra Kumar Sanadhya
:
Cryptanalysis of SIMON Variants with Connections. 90-107 - Nan Li
, Yi Mu, Willy Susilo
, Fuchun Guo
, Vijay Varadharajan
:
Privacy-Preserving Authorized RFID Authentication Protocols. 108-122 - Krishna Chaitanya Pabbuleti, Deepak Hanamant Mane, Patrick Schaumont:
Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node. 123-136 - Kostas Papapagiannopoulos:
High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers. 137-155 - Peter Pessl, Michael Hutter:
Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID. 156-172 - Luigi Sportiello:
ePassport: Side Channel in the Basic Access Control. 173-184 - Michael Weiner, Salvador Manich
, Georg Sigl:
A Low Area Probing Detector for Power Efficient Security ICs. 185-197 - Xin Ye, Cong Chen, Thomas Eisenbarth
:
Non-Linear Collision Analysis. 198-214

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.