Sciweavers

8 search results - page 2 / 2
» On the Security of HB
Sort
View
ASIACRYPT
2008
Springer
13 years 7 months ago
On the Security of HB# against a Man-in-the-Middle Attack
Khaled Ouafi, Raphael Overbeck, Serge Vaudenay
INDOCRYPT
2009
Springer
13 years 12 months ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implement...
Olivier Billet, Kaoutar Elkhiyaoui
ACSAC
2009
IEEE
14 years 3 days ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans