Abstract is missing.
- On the Security of Tan et al. Serverless RFID Authentication and Search ProtocolsMasoumeh Safkhani, Pedro Peris-Lopez, Nasour Bagheri, Majid Naderi, Julio César Hernández Castro. 1-19 [doi]
- Yet Another Ultralightweight Authentication Protocol That Is BrokenGildas Avoine, Xavier Carpent. 20-30 [doi]
- Improved Anonymity for Key-TreesThijs Veugen, Michael Beye. 31-47 [doi]
- Hidden Bits Approach for Authentication in RFID SystemsMarek Klonowski, Krzysztof Majcher, Wojciech Macyna, Filip Zagórski. 48-58 [doi]
- Designated Attribute-Based Proofs for RFID ApplicationsGergely Alpár, Lejla Batina, Wouter Lueks. 59-75 [doi]
- T-Match: Privacy-Preserving Item Matching for Storage-Only RFID TagsKaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva. 76-95 [doi]
- Private Yoking Proofs: Attacks, Models and New Provable ConstructionsJens Hermans, Roel Peeters. 96-108 [doi]
- Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation SystemsGesine Hinterwälder, Christof Paar, Wayne P. Burleson. 109-122 [doi]
- Weakening ePassports through Bad ImplementationsLuigi Sportiello. 123-136 [doi]
- Never Trust a BunnyDaniel J. Bernstein, Tanja Lange. 137-148 [doi]
- On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource MicrocontrollerHannes Groß, Thomas Plos. 149-164 [doi]
- DRV-Fingerprinting: Using Data Retention Voltage of SRAM Cells for Chip IdentificationDaniel E. Holcomb, Amir Rahmati, Mastooreh Salajegheh, Wayne P. Burleson, Kevin Fu. 165-179 [doi]