Author:
Sklavos Nicolas,Agarwal Vishal
Reference25 articles.
1. A. Juels, R.L. Rivest, and M. Szydlo. The blocker tag: Selective blocking of RFID tags for consumer privacy. In V. Atluri, ed. 8th ACM Conference on Computer and Communications Security (Philadelphia, PA, November, 2001) pp.103-111. ACM Press, 2003.
2. M. Ohkubo, K. Suzuki, and S. Kinoshita. Efficient hash-chain based RFID privacy protection scheme. InInternational Conference on Ubiquitous Computing-Ubicomp, Workshop Privacy:Current Status and Future Directions, 2004.
3. A. Juels. Minimalist Cryptography for RFID Tags. 4th Conference on Security in Comm. Networks (SCN), C. Blundo and S. Cimato, eds., Springer-Verlag, Heidelberg, Germany, 2004, 149-164.
4. P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal re-encryption for mixnets. In T. Okamoto, ed. RSA Conference Cryptographers Track (CT-RSA), vol.2964ofLecture Notes in Computer Science, pp.163-178, 2004.