关注
Gildas Avoine
Gildas Avoine
INSA Rennes, IRISA, CNRS
在 irisa.fr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A scalable and provably secure hash-based RFID protocol
G Avoine, P Oechslin
Third IEEE International Conference on Pervasive Computing and …, 2005
4792005
Reducing time complexity in RFID systems
G Avoine, E Dysli, P Oechslin
Selected Areas in Cryptography: 12th International Workshop, SAC 2005 …, 2006
3342006
RFID traceability: A multilayer problem
G Avoine, P Oechslin
Financial Cryptography and Data Security: 9th International Conference, FC …, 2005
3222005
The swiss-knife RFID distance bounding protocol
CH Kim, G Avoine, F Koeune, FX Standaert, O Pereira
Information Security and Cryptology–ICISC 2008: 11th International …, 2009
2412009
Browser fingerprinting: A survey
P Laperdrix, N Bielova, B Baudry, G Avoine
ACM Transactions on the Web (TWEB) 14 (2), 1-33, 2020
2262020
Adversarial model for radio frequency identification
G Avoine
Cryptology ePrint Archive, 2005
2152005
A framework for analyzing RFID distance bounding protocols
G Avoine, MA Bingöl, S Kardaş, C Lauradoux, B Martin
Journal of Computer Security 19 (2), 289-317, 2011
1592011
RFID distance bounding protocol with mixed challenges to prevent relay attacks
CH Kim, G Avoine
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
1482009
An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement
G Avoine, A Tchamkerten
Information Security: 12th International Conference, ISC 2009, Pisa, Italy …, 2009
1442009
Cryptography in radio frequency identification and fair exchange protocols
G Avoine
Verlag nicht ermittelbar, 2005
1242005
Noisy tags: A pretty good key exchange protocol for RFID tags
C Castelluccia, G Avoine
International Conference on Smart Card Research and Advanced Applications …, 2006
1212006
Characterization and improvement of time-memory trade-off based on perfect tables
G Avoine, P Junod, P Oechslin
ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-22, 2008
1112008
Privacy issues in RFID banknote protection schemes
G Avoine
Smart Card Research and Advanced Applications VI: IFIP 18th World Computer …, 2004
1072004
Adversary model for radio frequency identification
G Avoine
Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of …, 2005
992005
Cryptographie-Théorie et pratique/2ème édition
D Stinson, S Vaudenay, G Avoine, P Junod
vuibert, 2003
972003
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
872018
The Poulidor distance-bounding protocol
R Trujillo-Rasua, B Martin, G Avoine
Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010
812010
Time-memory trade-offs: False alarm detection using checkpoints
G Avoine, P Junod, P Oechslin
Progress in Cryptology-INDOCRYPT 2005: 6th International Conference on …, 2005
762005
Security and privacy in RFID systems
G Avoine
72*2006
Privacy-friendly authentication in RFID systems: on sublinear protocols based on symmetric-key cryptography
G Avoine, MA Bingöl, X Carpent, SBO Yalcin
IEEE Transactions on Mobile Computing 12 (10), 2037-2049, 2012
712012
系统目前无法执行此操作,请稍后再试。
文章 1–20