Search
Search Funnelback University
- Refined by:
- Date: 2006
1 -
7 of
7
search results for rfid
Fully-matching results
-
Positioning Security from electronic warfare to cheating RFID and ...
https://www.cl.cam.ac.uk/~mgk25/escar-2006.pdf13 Nov 2006: Applications:. RFID door access control. road-toll OBU. military friend-foe identification. prisoner tagging. ... 300 kbit/s (faster than most RFID protocols), a bit is 1 km long. -
PerSec 2007
https://www.cl.cam.ac.uk/~fms27/persec-2007/11 Dec 2006: Benessa Defend, Kevin Fu and Ari Juels. PerSec-1. _. Public-Key Cryptography for RFID-Tags. ... Yang Cui, Kazukuni Kobara, Kanta Matsuura and Hideki Imai. PerSec-3. _. RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy. -
Layout 1
https://www.cam.ac.uk/system/files/issue_1_research_horizons.pdf20 Sep 2006: R E S E A R C H. HORIZONS. The research magazine of the University of Cambridgewww.rsd.cam.ac.ukIssue 1 | October 2006. In this issueNEUROSCIENCE Plus other features and newsfrom around the University. 2 | RESEARCH HORIZONS | October 2006. -
PerSec 2005
https://www.cl.cam.ac.uk/~fms27/persec-2005/10 Feb 2006: Session 1: RFID. Stephen A. Weis, "Security Parallels Between People and Pervasive Devices". ... Gildas Avoine, Philippe Oechslin, "A Scalable and Provably Secure Hash-Based RFID Protocol". -
Security evaluation at design time for cryptographic hardware
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-665.pdf8 May 2006: Technical ReportNumber 665. Computer Laboratory. UCAM-CL-TR-665ISSN 1476-2986. Security evaluation at design timefor cryptographic hardware. Huiyun Li. April 2006. 15 JJ Thomson Avenue. Cambridge CB3 0FD. United Kingdom. phone 44 1223 763500. -
So near and yet so far: distance-bounding attacks in wireless networks
https://www.cl.cam.ac.uk/~mgk25/esas2006-distance.pdf27 Oct 2006: 22]1–10. 17. Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. -
location-encryption-persec-v4.1
https://www.cl.cam.ac.uk/~fms27/persec-2006/goodies/2006-AlmuhtadiHilCamETAL-encryption.pdf3 May 2006: RFID tags transmit UWB signals to networked readers and are located using “angle of ar-rival” and “difference of arrival” techniques.
Search history
Recently clicked results
Recently clicked results
Your click history is empty.
Recent searches
Recent searches
Your search history is empty.