default search action
12th RFIDSec 2016: Hong Kong, China
- Gerhard P. Hancke, Konstantinos Markantonakis:
Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10155, Springer 2017, ISBN 978-3-319-62023-7
Protocols
- Masoumeh Safkhani, Hoda Jannati, Nasour Bagheri:
Security Analysis of Niu et al. Authentication and Ownership Management Protocol. 3-16 - Hao Wang, Guangjie Han, Chunsheng Zhu, Sammy Chan:
PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor Networks. 17-29 - Xiong Li, Jianwei Niu, Kim-Kwang Raymond Choo:
A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks. 30-44
Side Channel and Hardware
- Siva Nishok Dhanuskodi, Daniel E. Holcomb:
Energy Optimization of Unrolled Block Ciphers Using Combinational Checkpointing. 47-61 - Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan:
LDA-Based Clustering as a Side-Channel Distinguisher. 62-75 - Zhe Liu, Reza Azarderakhsh, Howon Kim, Hwajeong Seo:
Efficient Implementation of Ring-LWE Encryption on High-End IoT Platform. 76-90 - Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? 91-104
Cards and Tokens
- Danushka Jayasinghe, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Enhancing EMV Tokenisation with Dynamic Transaction Tokens. 107-122 - Darren Hurley-Smith, Julio C. Hernandez-Castro:
Bias in the Mifare DESFire EV1 TRNG. 123-133
Proximity
- Sjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Optimality Results on the Security of Lookup-Based Protocols. 137-150 - Aysajan Abidin, Eduard Marin, Dave Singelée, Bart Preneel:
Towards Quantum Distance Bounding Protocols. 151-162 - Yunhui Zhuang, Alvin Chung Man Leung, James Hughes:
Matching in Proximity Authentication and Mobile Payment EcoSystem: What Are We Missing? 163-172
Communication
- David Cox, David F. Oswald:
\upmu Proxy: A Hardware Relay for Anonymous and Secure Internet Access. 175-187 - Qiao Hu, Gerhard P. Hancke:
Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks. 188-203
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.