- Hannes Groß, Erich Wenger, Honorio Martín, Michael Hutter:
PIONEER - a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID Tag. RFIDSec 2014: 54-73 - Chitra Javali, Girish Revadigar, Lavy Libman, Sanjay Jha:
SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks. RFIDSec 2014: 74-89 - Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
Privacy-Preserving Authorized RFID Authentication Protocols. RFIDSec 2014: 108-122 - Krishna Chaitanya Pabbuleti, Deepak Hanamant Mane, Patrick Schaumont:
Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node. RFIDSec 2014: 123-136 - Kostas Papapagiannopoulos:
High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers. RFIDSec 2014: 137-155 - Peter Pessl, Michael Hutter:
Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFID. RFIDSec 2014: 156-172 - Luigi Sportiello:
ePassport: Side Channel in the Basic Access Control. RFIDSec 2014: 173-184 - Michael Weiner, Salvador Manich, Georg Sigl:
A Low Area Probing Detector for Power Efficient Security ICs. RFIDSec 2014: 185-197 - Xin Ye, Cong Chen, Thomas Eisenbarth:
Non-Linear Collision Analysis. RFIDSec 2014: 198-214 - Nitesh Saxena, Ahmad-Reza Sadeghi:
Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8651, Springer 2014, ISBN 978-3-319-13065-1 [contents] - 2013
- Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya:
On the Security of Two RFID Mutual Authentication Protocols. RFIDSec 2013: 86-99 - Gildas Avoine, Muhammed Ali Bingöl, Xavier Carpent, Süleyman Kardas:
Deploying OSK on Low-Resource Mobile Devices. RFIDSec 2013: 3-18 - Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya:
Desynchronization and Traceability Attacks on RIPTA-DA Protocol. RFIDSec 2013: 57-68 - Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalçin:
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. RFIDSec 2013: 103-112 - Timo Kasper, Alexander Kühn, David F. Oswald, Christian T. Zenger, Christof Paar:
Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing. RFIDSec 2013: 34-53 - Deepak Hanamant Mane, Patrick Schaumont:
Energy-Architecture Tuning for ECC-Based RFID Tags. RFIDSec 2013: 147-160 - Shohreh Sharif Mansouri, Elena Dubrova:
An Improved Hardware Implementation of the Quark Hash Function. RFIDSec 2013: 113-127 - Mehmet Hilal Özcanhan, Gökhan Dalkiliç, Semih Utku:
Is NFC a Better Option Instead of EPC Gen-2 in Safe Medication of Inpatients. RFIDSec 2013: 19-33 - Konstantinos Papagiannopoulos, Aram Verstegen:
Speed and Size-Optimized Implementations of the PRESENT Cipher for Tiny AVR Devices. RFIDSec 2013: 161-175 - Luigi Sportiello, Andrea Ciardulli:
Long Distance Relay Attack. RFIDSec 2013: 69-85 - Erich Wenger, Thomas Korak, Mario Kirschbaum:
Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware. RFIDSec 2013: 128-144 - Jaap-Henk Hoepman, Ingrid Verbauwhede:
Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7739, Springer 2013, ISBN 978-3-642-36139-5 [contents] - Michael Hutter, Jörn-Marc Schmidt:
Radio Frequency Identification - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8262, Springer 2013, ISBN 978-3-642-41331-5 [contents] - 2012
- Gergely Alpár, Lejla Batina, Wouter Lueks:
Designated Attribute-Based Proofs for RFID Applications. RFIDSec 2012: 59-75 - Gildas Avoine, Xavier Carpent:
Yet Another Ultralightweight Authentication Protocol That Is Broken. RFIDSec 2012: 20-30 - Daniel J. Bernstein, Tanja Lange:
Never Trust a Bunny. RFIDSec 2012: 137-148 - Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags. RFIDSec 2012: 76-95 - Hannes Groß, Thomas Plos:
On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller. RFIDSec 2012: 149-164 - Jens Hermans, Roel Peeters:
Private Yoking Proofs: Attacks, Models and New Provable Constructions. RFIDSec 2012: 96-108 - Gesine Hinterwälder, Christof Paar, Wayne P. Burleson:
Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems. RFIDSec 2012: 109-122