Abstract is missing.
- Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and FactsFrederik Armknecht, Matthias Hamann, Vasily Mikhalev. 1-18 [doi]
- High-Speed Dating Privacy-Preserving Attribute Matching for RFIDLejla Batina, Jens Hermans, Jaap-Henk Hoepman, Anna Krasnova. 19-35 [doi]
- Massively Parallel Identification of Privacy-Preserving Vehicle RFID TagsRui Figueiredo, André Zúquete, Tomás Oliveira e Silva. 36-53 [doi]
- PIONEER - a Prototype for the Internet of Things Based on an Extendable EPC Gen2 RFID TagHannes Gross, Erich Wenger, Honorio Martín, Michael Hutter. 54-73 [doi]
- SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area NetworksChitra Javali, Girish Revadigar, Lavy Libman, Sanjay Jha. 74-89 [doi]
- Cryptanalysis of SIMON Variants with ConnectionsJavad Alizadeh, Hoda AlKhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar 0002, Martin M. Lauridsen, Somitra Kumar Sanadhya. 90-107 [doi]
- Privacy-Preserving Authorized RFID Authentication ProtocolsNan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan. 108-122 [doi]
- Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor NodeKrishna Chaitanya Pabbuleti, Deepak Hanamant Mane, Patrick Schaumont. 123-136 [doi]
- High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 CiphersKostas Papapagiannopoulos. 137-155 [doi]
- Curved Tags - A Low-Resource ECDSA Implementation Tailored for RFIDPeter Pessl, Michael Hutter. 156-172 [doi]
- ePassport: Side Channel in the Basic Access ControlLuigi Sportiello. 173-184 [doi]
- A Low Area Probing Detector for Power Efficient Security ICsMichael Weiner, Salvador Manich, Georg Sigl. 185-197 [doi]
- Non-Linear Collision AnalysisXin Ye, Cong Chen, Thomas Eisenbarth. 198-214 [doi]