Juels et al., 2008 - Google Patents
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.Juels et al., 2008
View PDF- Document ID
- 2570602446811925117
- Author
- Juels A
- Pappu R
- Parno B
- Publication year
- Publication venue
- USENIX security symposium
External Links
Snippet
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches:(1) Key sharing across space, ie, via simultaneously emitted values that may follow different data …
- 238000009826 distribution 0 title abstract description 15
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Juels et al. | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. | |
US11038694B1 (en) | Devices, methods, and systems for cryptographic authentication and provenance of physical assets | |
Ateniese et al. | Untraceable RFID tags via insubvertible encryption | |
Lehtonen et al. | From identification to authentication–a review of RFID product authentication techniques | |
Juels | Minimalist cryptography for low-cost RFID tags | |
Guajardo et al. | Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions | |
Burmester et al. | Lightweight RFID authentication with forward and backward security | |
WO2006070189A2 (en) | Control of rfid data exchange | |
Sadeghi et al. | User privacy in transport systems based on RFID e-tickets | |
Mohsin et al. | Exploring the RFID mutual authentication domain | |
Weis | New foundations for efficient authentication, commutative cryptography, and private disjointness testing | |
Bernardi et al. | Agri-food traceability management using a RFID system with privacy protection | |
Ranasinghe et al. | Confronting security and privacy threats in modern RFID systems | |
Cai et al. | Distributed path authentication for dynamic RFID-enabled supply chains | |
Yang et al. | A privacy model for RFID tag ownership transfer | |
Malek et al. | Lightweight mutual RFID authentication | |
Chen et al. | A secure RFID authentication protocol adopting error correction code | |
Kardaş et al. | Providing resistance against server information leakage in RFID systems | |
Pappu et al. | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security Ari Juels RSA Laboratories | |
Clupek et al. | Robust mutual authentication and secure transmission of information on low-cost devices using physical unclonable functions and hash functions | |
Li et al. | Secure and practical key distribution for RFID-enabled supply chains | |
Chikouche et al. | Eap-sres: An enhanced authentication protocol for secure remote education systems using nfc technology | |
Cai et al. | Enabling secure secret updating for unidirectional key distribution in RFID-enabled supply chains | |
Bilal | Addressing security and privacy issues in low-cost RFID systems | |
David | Lightweight cryptography for passive RFID tags |