Abstract is missing.
- The Physical Basis of RFID SecurityAri Juels. 1 [doi]
- Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage ModelNitesh Saxena, Jonathan Voris. 2-21 [doi]
- Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication ProtocolJulio César Hernández Castro, Pedro Peris-Lopez, Raphael C.-W. Phan, Juan M. Estévez-Tapiador. 22-34 [doi]
- Practical NFC Peer-to-Peer Relay Attack Using Mobile PhonesLishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis. 35-49 [doi]
- Strong Authentication and Strong Integrity (SASI) Is Not That StrongGildas Avoine, Xavier Carpent, Benjamin Martin 0002. 50-64 [doi]
- Privacy Models for RFID SchemesSerge Vaudenay. 65 [doi]
- On the Claimed Privacy of EC-RAC IIIJunfeng Fan, Jens Hermans, Frederik Vercauteren. 66-74 [doi]
- EC-RAC: Enriching a Capacious RFID Attack CollectionTon van Deursen, Sasa Radomirovic. 75-90 [doi]
- Anonymous RFID Authentication Using Trusted Computing TechnologiesKurt Dietrich. 91-102 [doi]
- Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-FriendlyGildas Avoine, Benjamin Martin 0002, Tania Martin. 103-122 [doi]
- Hardware Intrinsic SecurityPim Tuyls. 123 [doi]
- Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-CounterfeitingFlorian Kerschbaum, Nina Oertel. 124-137 [doi]
- Time Measurement Threatens Privacy-Friendly RFID Authentication ProtocolsGildas Avoine, Iwen Coisel, Tania Martin. 138-157 [doi]
- Anonymous Authentication for RFID SystemsFrederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, Christian Wachsmann. 158-175 [doi]
- Leakage-Resilient RFID Authentication with Forward-PrivacyShin ichiro Matsuo, Le Trieu Phong, Miyako Ohkubo, Moti Yung. 176-188 [doi]
- An ECDSA Processor for RFID AuthenticationMichael Hutter, Martin Feldhofer, Thomas Plos. 189-202 [doi]
- Towards a Practical Solution to the RFID Desynchronization ProblemGerhard de Koning Gans, Flavio D. Garcia. 203-219 [doi]
- Optimal Security Limits of RFID Distance Bounding ProtocolsOrhun Kara, Süleyman Kardas, Muhammed Ali Bingöl, Gildas Avoine. 220-238 [doi]
- The Poulidor Distance-Bounding ProtocolRolando Trujillo-Rasua, Benjamin Martin 0002, Gildas Avoine. 239-257 [doi]
- A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification ApplicationsElif Bilge Kavun, Tolga Yalçin. 258-269 [doi]