default search action
6th RFIDSec 2010: Istanbul, Turkey
- Siddika Berna Örs Yalçin:
Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6370, Springer 2010, ISBN 978-3-642-16821-5
Invited Talk 1
- Ari Juels:
The Physical Basis of RFID Security. 1
Session 1
- Nitesh Saxena, Jonathan Voris:
Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model. 2-21 - Julio César Hernández Castro, Pedro Peris-Lopez, Raphael C.-W. Phan, Juan M. Estévez-Tapiador:
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol. 22-34 - Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones. 35-49 - Gildas Avoine, Xavier Carpent, Benjamin Martin:
Strong Authentication and Strong Integrity (SASI) Is Not That Strong. 50-64
Invited Talk 2
- Serge Vaudenay:
Privacy Models for RFID Schemes. 65
Session 2
- Junfeng Fan, Jens Hermans, Frederik Vercauteren:
On the Claimed Privacy of EC-RAC III. 66-74 - Ton van Deursen, Sasa Radomirovic:
EC-RAC: Enriching a Capacious RFID Attack Collection. 75-90 - Kurt Dietrich:
Anonymous RFID Authentication Using Trusted Computing Technologies. 91-102 - Gildas Avoine, Benjamin Martin, Tania Martin:
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly. 103-122
Invited Talk 3
- Pim Tuyls:
Hardware Intrinsic Security. 123
Session 3
- Florian Kerschbaum, Nina Oertel:
Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting. 124-137 - Gildas Avoine, Iwen Coisel, Tania Martin:
Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols. 138-157 - Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, Christian Wachsmann:
Anonymous Authentication for RFID Systems. 158-175 - Shin'ichiro Matsuo, Le Trieu Phong, Miyako Ohkubo, Moti Yung:
Leakage-Resilient RFID Authentication with Forward-Privacy. 176-188
Session 4
- Michael Hutter, Martin Feldhofer, Thomas Plos:
An ECDSA Processor for RFID Authentication. 189-202 - Gerhard de Koning Gans, Flavio D. Garcia:
Towards a Practical Solution to the RFID Desynchronization Problem. 203-219
Session 5
- Orhun Kara, Süleyman Kardas, Muhammed Ali Bingöl, Gildas Avoine:
Optimal Security Limits of RFID Distance Bounding Protocols. 220-238 - Rolando Trujillo-Rasua, Benjamin Martin, Gildas Avoine:
The Poulidor Distance-Bounding Protocol. 239-257 - Elif Bilge Kavun, Tolga Yalçin:
A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications. 258-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.