RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey

Michael Hutter

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Original languageEnglish
Title of host publicationInternational Conference on Security and Cryptography - SECRYPT 2009, it is part of ICETE - The International Joint Conference on e-Business and Telecommunications, Milan, Italy, July 7-10, 2009, Proceedings
Publisher.
Pages101-110
ISBN (Print)978-989-674-005-4
Publication statusPublished - 2009
EventInternational Conference on Security and Cryptography - Milan, Italy
Duration: 7 Jul 200910 Jul 2009

Conference

ConferenceInternational Conference on Security and Cryptography
Country/TerritoryItaly
CityMilan
Period7/07/0910/07/09

Treatment code (Nähere Zuordnung)

  • Basic - Fundamental (Grundlagenforschung)
  • Theoretical
  • CRYPTA - Cryptographic Protected Tags for new RFID Applications

    Posch, K., Feldhofer, M., Dominikus, S., Plos, T., Aigner, M. J., Hutter, M. & Schmidt, J.

    1/02/0931/03/11

    Project: Research project

  • EU - C@R - Collaboration Rural

    Schläffer, M., Medwed, M., Feldhofer, M., Hutter, M., Wolkerstorfer, J. & Aigner, M. J.

    1/09/0631/05/10

    Project: Research project

  • RFID Security

    Wenger, E., Hutter, M., Oswald, M. E., Posch, K., Plos, T., Herbst, C., Schmidt, J., Feldhofer, M., Szekely, A., Dominikus, S., Aigner, M. J., Kirschbaum, M., Medwed, M. & Posch, R.

    1/01/0515/07/19

    Project: Research area

Cite this