WWW.DISSERTATION.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Dissertations, online materials
 
<< HOME
CONTACTS



Pages:   || 2 | 3 | 4 | 5 |   ...   | 19 |

«Information Security Group Universit´ catholique de Louvain e Louvain-la-Neuve, Belgium Version October 13, 2015 Abstract. This document is the ...»

-- [ Page 1 ] --

Bibliography on Security and Privacy in RFID Systems

Information Security Group

Universit´ catholique de Louvain

e

Louvain-la-Neuve, Belgium

Version October 13, 2015

Abstract. This document is the printable and citable version of the online bibliography on security

and privacy in RFID systems, available at http://www.avoine.net/rfid/. The website is maintained by

the UCL’s Information Security Group (Belgium) headed by Gildas Avoine. This bibliography contains

references toward refereed scientific papers published in journals and conference proceedings, as well as technical reports and thesis. It is updated on an irregular basis depending on the flow of papers published in the domain.

1. M. B. Abdelhalim, M. El-Mahallawy, M. Ayyad, and A. El-Mahallawy. Design and implementation of an encryption algorithm for use in RFID system. International Journal of RFID Security and Cryptography, 1:51–57, March 2012.

2. Behzad Abdolmaleki, Karim Baghery, Bahareh Akhbari, and Mohammad Reza Aref. Cryptanalysis of two EPC-based RFID security schemes. In International ISC Conference on Information Security and Cryptology – ISCISC2015, pages 1–6. IEEE, September 2015.

3. Behzad Abdolmaleki, Karim Baghery, Bahareh Akhbari, and Mohammad Reza Aref. Attacks and improvements on two new-found RFID authentication protocols. In International Symposium on Telecommunications – IST 2014, pages 1–6, July 2014.

4. Shahab Abdolmaleky, Shahla Atapoor, Mohammad Hajighasemlou, and Hamid Sharini. A strengthened version of a hash-based RFID server-less security scheme. Advances in Computer Science: an International Journal, 4(3):18–23, May 2015.

5. Srujana Adepwar and P. Swetha. Security solution for real time location systems using distance bounding.

International Journal of Technology and Engineering Science, 2(6):1933–1937, June 2014.

6. A. O. Afolabi, A. A. Atayero, P. Ajayi, and P. Wogu. Implementation of biometric RFID identification system:

A case study of covenant university. Covenant University ePrint Repository, 2015.

7. Arjun Agarwal and Mala Mitra. RFID: Promises and Problems, April 2006.

8. Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, and Somitra Kumar Sanad- hya. On the security of two RFID mutual authentication protocols. In Workshop on RFID Security – RFID- Sec’13, Graz, Austria, July 2013.

9. Tanvi Agrawal, P.K. Biswas, and A.D. Raoot. An optimized query tree algorithm in RFID inventory tracking – a case study evidence. IJCSI International Journal of Computer Science Issues, 9(1):85–93, July 2012.

10. Isaac Agudo, Ruben Rios, and Javier Lopez. A privacy-aware continuous authentication scheme for proximitybased access control. Computers & Security, (0), May 2013.

11. Hadi Ahmadi and Reihaneh Safavi-Naini. Secure distance bounding verification using physical-channel properties. arXiv.org, Computer Science, Cryptography and Security, 2013.

12. Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref. Desynchronization attack on RAPP ultralightweight authentication protocol. Cryptology ePrint Archive, Report 2012/490, 2012.

13. Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref. Recursive linear and differential cryptanalysis of ultralightweight authentication protocols. Cryptology ePrint Archive, Report 2012/489, 2012.

14. Manfred Aigner. Security in the Internet of Things. In Workshop on RFID Security – RFIDSec Asia’10, volume 4 of Cryptology and Information Security, Singapore, Republic of Singapore, February 2010. IOS Press.

15. Manfred Aigner and Martin Feldhofer. Secure Symmetric Authentication for RFID Tags. In Telecommunication and Mobile Computing – TCMC 2005, Graz, Austria, March 2005.

16. Qurat Ul Ain, Yusra Mahmood, Umar Mujahid, and Muhammad Najam-ul islam. Cryptanalysis of mutual ultralightweight authentication protocols: SASI and RAPP. In International Conference on Open Source Systems and Technologies – ICOSST 2014, pages 136–145, Lahore, Pakistan, December 2014.

17. Mete Akg¨ n, Ali Osman Bayrak, and Mehmet Ufuk Caˇlayan. Attacks and improvements to chaotic map-based u ¸g RFID authentication protocol. Security and Communication Networks, July 2015.

18. Mete Akgun and M. Ufuk Caglayan. Weaknesses of two RFID protocols regarding de-synchronization attacks.

In International Wireless Communications and Mobile Computing Conference IWCMC – 2015, Dubrovnik, Croatia, August 2015.

19. Mete Akg¨n and M. Ufuk Caˇlayan. On the security of recently proposed RFID protocols. Cryptology ePrint u ¸g Archive, Report 2013/820, 2013.

20. Mete Akg¨ n and M. Ufuk Caˇlayan. Providing destructive privacy and scalability in RFID systems using u ¸g PUFs. Ad Hoc Networks, February 2015.

21. Mete Akg¨n and Mehmet Caˇlayan. Extending an rfid security and privacy model by considering forward unu ¸g traceability. In Security and Trust Management, pages 239–254, Technical University of Denmark, Copenhagen, June 2011.

22. Mete Akg¨ n and Mehmet Ufuk Caˇlayan. Towards scalable identification in RFID systems. Wireless Personal u ¸g Communications, August 2015.





23. Mahdi R. Alagheband and Mohammad R. Aref. Unified privacy analysis of new-found RFID authentication protocols. Security and Communication Networks, 5(12), December 2012.

24. Mahdi R. Alagheband and Mohammad R. Aref. Simulation-based traceability analysis of RFID authentication protocols. Wireless Personal Communications, December 2013.

25. Rima Hussin Embrak Alakrut, Azman Samsudin, and Alfin Syafalni. Provably lightweight RFID mutual authentication protocol. International Journal of Security and Its Applications, 7(4), July 2013.

26. Seyed Mohammad Alavi, Behzad Abdolmaleki, and Karim Baghery. Vulnerabilities and improvements on HRAP+, a hash-based RFID authentication protocol. Advances in Computer Science: an International Journal, 3(6):51–56, November 2014.

27. Seyed Mohammad Alavi, Karim Baghery, and Behzad Abdolmaleki. Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags. Advances in Computer Science : an International Journal, 3(5):44–52, September 2014.

28. Seyed Mohammad Alavi, Karim Baghery, Behzad Abdolmaleki, and Mohammad Reza Aref. Traceability analysis of recent RFID authentication protocols. Wireless Personal Communications, pages 1–20, March 2015.

29. Hisham Khalaf Allahem. Mutual authentication scheme for mobile rfid systems. Master thesis, Dalhousie University, Halifax, Nova Scotia, Canada, March 2013.

30. Basel Alomair, Andrew Clark, Jorge Cuellar, and Radha Poovendran. Scalable RFID Systems: a PrivacyPreserving Protocol with Constant-Time Identification. In the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – DSN’10, Chicago, Illinois, USA, June 2010. IEEE, IEEE Computer Society.

31. Basel Alomair, Andrew Clark, Jorge Cuellar, and Radha Poovendran. Scalable RFID systems: A privacypreserving protocol with constant-time identification. IEEE Transactions on Parallel and Distributed Systems, 2011.

32. Basel Alomair, Loukas Lazos, and Radha Poovendran. Passive Attacks on a Class of Authentication Protocols for RFID. In Kil-Hyun Nam and Gwangsoo Rhee, editors, International Conference on Information Security and Cryptology – ICISC 2007, volume 4817 of Lecture Notes in Computer Science, pages 102–115, Seoul, Korea, November 2007. Springer.

33. Basel Alomair, Loukas Lazos, and Radha Poovendran. Securing Low-cost RFID Systems: an Unconditionally Secure Approach. Journal of Computer Security – Special Issue on RFID System Security, 2010.

34. Basel Alomair, Loukas Lazos, and Radha Poovendran. Securing Low-Cost RFID Systems: an Unconditionally Secure Approach. In Workshop on RFID Security – RFIDSec Asia’10, volume 4 of Cryptology and Information Security, Singapore, Republic of Singapore, February 2010. IOS Press.

35. Basel Alomair and Radha Poovendran. On the Authentication of RFID Systems with Bitwise Operations. In New Technologies, Mobility and Security – NTMS’08, pages 1–6, Tangier, Morocco, November 2008. IEEE, IEEE Computer Society.

36. Basel Alomair and Radha Poovendran. Efficient Authentication for Mobile and Pervasive Computing. In Sihan Qing Miguel Soriano and Javier Lopez, editors, International Conference on Information and Communications Security – ICICS’10, volume 6476 of Lecture Notes in Computer Science, pages 186–202, Barcelona, Spain, December 2010. Springer.

2

37. Basel Alomair and Radha Poovendran. Privacy versus Scalability in Radio Frequency Identification Systems.

Computer Communication, Elsevier, 2010.

38. Gergely Alpar, Lejla Batina, and Wouter Lueks. Designated attribute-based proofs for RFID applications. In Workshop on RFID Security – RFIDSec’12, Nijmegen, Netherlands, June 2012.

39. Abdulhadi Alqarni, Maali Alabdulhafith, and Srinivas Sampalli. A proposed RFID authentication protocol based on two stages of authentication. In The 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks – EUSPN-2014, Halifax, Nova Scotia, Canada, September 2014.

40. George T. Amariucai, Clifford Bergman, and Yong Guan. An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID. In Workshop on RFID Security – RFIDSec’11, Amherst, Massachusetts, USA, June 2011.

41. Myrto Arapinis, Tom Chothia, Eike Ritter, and Mark Ryan. Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. In Computer Security Foundations Symposium – CSF 2010, Edinburgh, United Kingdom, July 2010. IEEE.

42. Alex Arbit, Yoel Livne, Yossef Oren, and Avishai Wool. Implementing public-key cryptography on passive RFID tags is practical. International Journal of Information Security, April 2014.

43. Mohammad Arjmand, Mahmoud Gardeshi, Reza Taheri zohur, and Mohammad Kazemi. Providing a distance bounding protocol named pasargad in order to defend against relay attacks on RFID-based electronic voting system. International Journal of UbiComp, 2(3):69–82, 2011.

44. Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, and Christian Wachsmann. Anonymous Authentication for RFID Systems. In S.B. Ors Yalcin, editor, Workshop on RFID Security – RFIDSec’10, volume 6370 of Lecture Notes in Computer Science, pages 158–175, Istanbul, Turkey, June 2010. Springer.

45. Frederik Armknecht, Matthias Hamann, and Vasily Mikhalev. Lightweight authentication protocols on ultralightweight RFIDs – myths and facts. In Workshop on RFID Security – RFIDSec’14, Oxford, UK, July 2014.

46. Frederik Armknecht, Ahmad-Reza Sadeghi, Alessandra Scafuro, Ivan Visconti, and Christian Wachsmann.

Impossibility Results for RFID Privacy Notions. Transaction on Computational Science XI, 6480:39–63, 2010.

47. Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, and Christian Wachsmann. On RFID Privacy with Mutual Authentication and Tag Corruption. In Jianying Zhou and Moti Yung, editors, Proceedings of the 8th International Conference on Applied Cryptography and Network Security – ACNS 2010, volume 6123 of Lecture Notes in Computer Science, pages 493–510, Beijing, China, June 2010. Springer.

48. Mahdi Asadpour and Mohammad Torabi Dashti. A privacy-friendly RFID protocol using reusable anonymous tickets. In 10th International Conference on Trust, Security and Privacy in Computing and Communications – TrustCom 2011, pages 206–213, November 2011.

49. Aisha Aseeri and Omaima Bamasak. HB-MP∗ :towards a man-in-the-middle-resistant protocol of HB family.

In 1st International Conference on Wireless Communications and Mobile Computing, page 4, Istanbul, Turkey, June 2011.

50. Giuseppe Ateniese, Jan Camenisch, and Breno de Medeiros. Untraceable RFID Tags via Insubvertible Encryption. In Vijay Atluri, Catherine Meadows, and Ari Juels, editors, Conference on Computer and Communications Security – ACM CCS’05, pages 92–101, Alexandria, Virginia, USA, November 2005. ACM, ACM Press.

51. Ali Atici, Lejla Batina, Benedikt Gierlichs, and Ingrid Verbauwhede. Power Analysis on NTRU Implementations for RFIDs: First Results. In Workshop on RFID Security – RFIDSec’08, Budapest, Hungary, July 2008.

52. Jean-Philippe Aumasson, Aikaterini Mitrokotsa, and Pedro Peris-Lopez. A note on a privacy-preserving distance-bounding protocol. In Sihan Qing, Willy Susilo, Guilin Wang, and Dongmei Liu, editors, International Conference on Information and Communications Security – ICICS’11, volume 2043 of Lecture Notes in Computer Science, pages 78–92. Springer Berlin / Heidelberg, November 2011.

53. Myo Min Aung, Yoon Seok Chang, and Jong-un Won. Emerging RFID/USN applications and challenges.

International Journal of RFID Security and Cryptography, 1:3–8, March 2012.

54. Gildas Avoine. Privacy Issues in RFID Banknote Protection Schemes. In Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, and Anas Abou El Kadam, editors, International Conference on Smart Card Research and Advanced Applications – CARDIS 2004, pages 33–48, Toulouse, France, August 2004. IFIP, Kluwer Academic Publishers.

55. Gildas Avoine. Adversary Model for Radio Frequency Identification. Technical Report LASEC-REPORTSwiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland, September 2005.

56. Gildas Avoine. Cryptography in Radio Frequency Identification and Fair Exchange Protocols. PhD thesis, EPFL, Lausanne, Switzerland, December 2005.

57. Gildas Avoine, Muhammed Ali Bingol, Xavier Carpent, and Suleyman Kardas. Deploying OSK on low-resource mobile devices. In Workshop on RFID Security – RFIDSec’13, Graz, Austria, July 2013.

3 ¨

58. Gildas Avoine, Muhammed Ali Bing¨l, Xavier Carpent, and Sıddıka Berna Ors Yal¸ın. Privacy-friendly autheno c tication in RFID systems: On sub-linear protocols based on symmetric-key cryptography. IEEE Transactions on Mobile Computing, 12(10):2037–2049, October 2013.



Pages:   || 2 | 3 | 4 | 5 |   ...   | 19 |


Similar works:

«Determination of Texture From Individual Grain Orientation Measurements John E. Blendell, Mark D. Vaudin and Edwin R. Fuller, Jr. Ceramics Division Materials Science and Engineering Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 USA Abstract We present a technique for determining the texture of a polycrystalline material based on the measurement of the orientation of a number of individual grains. We assumed that the sample has fiber (i.e. axisymmetric) texture...»

«Defect detection in textured surfaces using color ring-projection correlation D. M. Tsai and Y. H. Tsai Machine Vision Lab. Department of Industrial Engineering and Management Yuan-Ze University, Chung-Li, Taiwan, R.O.C. E-mail: iedmtsai@saturn.yzu.edu.tw 1. INTRODUCTION Image analysis techniques are being increasingly used to automate industrial inspection. For defect inspection in complicated material surfaces, color and texture are two of the most important properties. Detecting an entire...»

«Bibliotheca Hagiotheca ∙ Series Colloquia II Saintly Bishops and Bishops’ Saints: Proceedings of the 3rd Hagiography Conference organized by Croatian Hagiography Society 'Hagiotheca' and International Hagiography Society, Poreč, 27-30 May 2010 Edited by John S. Ott and Trpimir Vedriš Copy-editing: Marina Miladinov Bibliotheca Hagiotheca ∙ Series Colloquia, vol. 2. Series editors: Ana Marinković and Trpimir Vedriš First published 2012 Croatian Hagiography Society 'Hagiotheca',...»

«Trauma Therapists in Israel A Qualitative Study into Personal, Familial and Societal Sources of A Priori Countertransference Yvonne Tauber Trauma Therapists in Israel: A Qualitative Study into Personal, Familial and Societal Sources of A Priori Countertransference ISBN 978-965-91302-0-7 Copyright © 2008, Yvonne Tauber Printed by Gildeprint, Enschede All rights reserved. No part of this publication may be reproduced in any form by any electronic or mechanical means (including photocopying,...»

«Department of Chemical and Biomolecular Engineering November, 2008 The mission of the Department is to provide the highest quality programs to educate students in the principles and applications of Chemical and Biomolecular Eengineering. The excellence of the program is ensured by the high regard for teaching, strong research activities and solid industrial ties. The program educates students to take leadership roles in industry, academia and government. The Graduate Program The Department of...»

«2 FIRST EDITION ALL RIGHTS RESERVED ©Copyright 2015 by Marsha Stewart All rights reserved. No part of this book may be stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the author. Published by OSRW Southfield, MI 48075 3 Contents Page Foreword.. 4 Introduction.. 6 Chapter 1: 5,000,000 Indigenous Americans Present When Columbus Arrived. 8 Chapter 2: DNA The Determiner. 19 Chapter 3:...»

«ECNDT 2006 Tu.2.1.1 In-Service Inspection Concept for GLARE® – An Example for the Use of New UT Array Inspection Systems Wolfgang BISLE, Theodor MEIER, Sascha MUELLER, Sylvia RUECKERT Airbus, Bremen Abstract. UT phased arrays and array transducers for FIT (Field Inspection Technology) open new chances for NDT of complex structure materials in aeronautics. GLARE® is such a new material which will widely be used on the new Airbus A380. Even as GLARE® in the A380 needs no scheduled NDT...»

«Old Norse Myths, Literature and Society Proceedings of the 11th International Saga Conference 2-7 July 2000, University of Sydney Edited by Geraldine Barnes and Margaret Clunies Ross Centre for Medieval Studies, University of Sydney Sydney, Australia July 2000 © 2000, Contributors All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without...»

«Otty Lake Association Annual General Meeting (AGM) Minutes Saturday, July 9th, 2016, 9:30 – 11:30 am The Perth Legion Welcome – Reid welcomed everyone to the AGM at 9:30 am. He thanked the displayers. He also thanked Cathy Buffam and Tiger Tanner for all their work as the AGM’s technical team for many years. He thanked Gail Read and her daughter Lana, Krista Hearty McLean and Chuck Shenkman for taking over as our technical team this year. In addition to celebrating the 200th anniversary...»

«Proposal for a Scintillator Tile Hodoscope for PANDA Version 1.1 K. Goetzen, H. Orth, G. Schepers, L. Schmitt, C. Schwarz, A. Wilms Abstract In this document a new detector in place of the barrel time-of-flight detector is proposed. This detector is based on small scintillator tiles read out by silicon photomultipliers. The motivation in terms of physics and technical benefits are summarized. Details of the detector layout are given. 1 CONTENTS 2 Contents 1 Introduction 3 2 Physics Motivation...»

«Martin Potter NATURE IN MODERNITY: CAN IT SIGNIFY? – DAVID JONES AND NATURAL OBJECTS AS SIGNS Keywords: nature, symbol, poetry, utility aesthetics, modernity, ‘the Break’. Abstract: Since the Enlightenment nature has often been seen as a resource for exploitation rather than as an object of wonder. A combination of utilitarian modes of thought, the growth in the prestige of science and technology, and processes of industrialization, has favoured the tendency to view natural objects as...»

«Fast Track Trade Authority Must Be Replaced To Deliver Trade Agreement that Can Deliver Broad Benefits March 23, 2015 Dear Senator: Last fall, our organizations were joined by nearly 600 other unions and environmental, consumer, faith, family farm, civil rights, seniors, LGBT and other civil society organizations on a letter outlining the features of a trade authority mechanism that we would support. As negotiations on a prospective trade authority bill continue, we wanted to bring these...»





 
<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.