3 Hits in 5.1 sec

Untraceable RFID authentication protocols: Revision of EC-RAC

Yong Ki Lee, L. Batina, I. Verbauwhede
2009 2009 IEEE International Conference on RFID  
More precisely, we first revise the EC-RAC (Elliptic Curve Based Randomized Access Control) protocol and we expand it into several authentication protocols.  ...  However, additional security always comes at price and the scarceness of resources on a tag makes conventional privacy-preserving protocols infeasible.  ...  Cryptanalysis of EC-RAC The EC-RAC protocol is aimed to be secure against the tracking attack [11] .  ... 
doi:10.1109/rfid.2009.4911179 fatcat:nh6y46ffnfeftnoizbihiyluve

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+100 others)
2016 International Journal of Network Security   unpublished
Certificateless-based signature can also overcome the certificate management problem and the key escrow problem of the traditional signature system.  ...  Acknowledgments Acknowledgments This study was supported by the National Science Council of Taiwan under grant NSC102-2221-E-468-020 and NSC101-2622-E-468-002-CC3.  ...  This work is supported by Natural Science Foundation of Shandong Province(NO.ZR2013FM009). Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments.  ... 

2016 Jahresbericht Annual Report

Jähnichen Stefan, Raimund Geschäftsführung, Seidel, Meißner Heike, Gesellschafter
The organisers would like to express their gratitude to the participants and the Schloss Dagstuhl team for a productive and exciting seminar.  ...  We organizers are all thankful to the participants, who all brought a unique insight to the seminar, which in my humble opinion, succeeded in its aims.  ...  RAC (Right Angle Crossing) graphs: a graph which has a straight-line drawing with right angle crossings.  ...