容易做 发表于 2025-3-25 04:32:45

http://reply.papertrans.cn/83/8207/820622/820622_21.png

prostatitis 发表于 2025-3-25 10:42:43

0302-9743 Sec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.978-3-319-1306

明确 发表于 2025-3-25 11:43:52

http://reply.papertrans.cn/83/8207/820622/820622_23.png

Apraxia 发表于 2025-3-25 16:04:34

http://reply.papertrans.cn/83/8207/820622/820622_24.png

序曲 发表于 2025-3-25 21:11:49

High-Speed Dating Privacy-Preserving Attribute Matching for RFID,f the protocols presented in this paper only needs a (lightweight) hash function implemented on the tags. Two other protocols additionally need asymmetric encryption, which is feasible on more powerful tags that support elliptic-curve scalar multiplication.

谄媚于性 发表于 2025-3-26 02:27:30

http://reply.papertrans.cn/83/8207/820622/820622_26.png

微尘 发表于 2025-3-26 06:49:49

http://reply.papertrans.cn/83/8207/820622/820622_27.png

jagged 发表于 2025-3-26 12:28:40

Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node,ignature scheme (W-OTS). We demonstrate that there’s a trade-off between energy used for communication, energy used for computation, and security level. However, when we consider the energy needs for the overall system, we show that all schemes are within one order of magnitude from each another.

压倒性胜利 发表于 2025-3-26 13:27:47

ePassport: Side Channel in the Basic Access Control,rder to get access to the chip’s content. We have verified the presence of such side channel in real ePassports and stress that electronic Driving Licences could be affected as well, since the same access control mechanism is adopted for them.

irradicable 发表于 2025-3-26 17:15:19

Non-Linear Collision Analysis,s attack has been verified by experiments on an unprotected microcontroller implementation of AES. Its immunity to modeling errors is confirmed through simulation of a broad range of leakage functions.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Radio Frequency Identification: Security and Privacy Issues; 10th International W Nitesh Saxena,Ahmad-Reza Sadeghi Conference proceedings 2