Proceedings of CRYPTO 84 on Advances in cryptology
Some improved bounds on the information rate of perfect secret sharing schemes
Journal of Cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On sharing secrets and Reed-Solomon codes
Communications of the ACM
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
OCB: A block-cipher mode of operation for efficient authenticated encryption
ACM Transactions on Information and System Security (TISSEC)
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
Designs, Codes and Cryptography
Security and Privacy Issues in E-passports
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Robust computational secret sharing and a unified account of classical secret-sharing goals
Proceedings of the 14th ACM conference on Computer and communications security
RFID privacy using spatially distributed shared secrets
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
Collusion resistant broadcast encryption with short ciphertexts and private keys
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Improved decoding of Reed-Solomon and algebraic-geometry codes
IEEE Transactions on Information Theory
RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
RFID privacy: relation between two notions, minimal condition, and efficient construction
Proceedings of the 16th ACM conference on Computer and communications security
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
Achieving high security and efficiency in RFID-tagged supply chains
International Journal of Applied Cryptography
Physical-layer identification of RFID devices
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Physical-layer identification of UHF RFID tags
Proceedings of the sixteenth annual international conference on Mobile computing and networking
"Who counterfeited my Viagra?" probabilistic item removal detection via RFID tag cooperation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
An efficient group-based secret sharing scheme
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
An RFID Based Multi-batch Supply Chain Systems
Wireless Personal Communications: An International Journal
Enabling secure secret updating for unidirectional key distribution in RFID-Enabled supply chains
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Hi-index | 0.00 |
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches: (1) Key sharing across space, i.e., via simultaneously emitted values that may follow different data paths and (2) Key sharing across time, i.e., in temporally staggered emissions. Our constructions are of general interest, treating, for instance, the basic problem of constructing highly compact secret shares. Our main motivating problem, however, is practical key management in RFID (Radio-Frequency IDentification) systems. We describe the application of our techniques to RFID-enabled supply chains and a prototype privacy-enhancing system.