Shoehorning Security into the EPC Tag Standard
- 1 January 2006
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 303-320
- https://doi.org/10.1007/11832072_21
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Reducing Time Complexity in RFID SystemsLecture Notes in Computer Science, 2006
- High-Power Proxies for Enhancing RFID Privacy and UtilityLecture Notes in Computer Science, 2006
- Strengthening EPC tags against cloningPublished by Association for Computing Machinery (ACM) ,2005
- Authenticating Pervasive Devices with Human ProtocolsLecture Notes in Computer Science, 2005
- Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract)Lecture Notes in Computer Science, 2005
- Some Methods for Privacy in RFID CommunicationLecture Notes in Computer Science, 2005
- "Yoking-proofs" for RFID tagsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Universal Re-encryption for MixnetsLecture Notes in Computer Science, 2004
- Strong Authentication for RFID Systems Using the AES AlgorithmLecture Notes in Computer Science, 2004
- The blocker tagPublished by Association for Computing Machinery (ACM) ,2003