Gildas Avoine
Gildas Avoine
INSA Rennes, IRISA UMR 6074, Université catholique de Louvain (ICTEAM, EPL)
Adresse e-mail validée de - Page d'accueil
TitreCitée parAnnée
A scalable and provably secure hash-based RFID protocol
G Avoine, P Oechslin
Third IEEE International Conference on Pervasive Computing and …, 2005
RFID traceability: A multilayer problem
G Avoine, P Oechslin
International Conference on Financial Cryptography and Data Security, 125-140, 2005
Reducing time complexity in RFID systems
G Avoine, E Dysli, P Oechslin
International workshop on selected areas in cryptography, 291-306, 2005
Cooperation of nodes. in: L. Buttyan and J.-P. Hubaux (eds.), report on a working session on security in wireless ad hoc networks
S Buchegger, JY Le Boudec
ACM Mobile Computing and Communications Review (MC2R) 6 (ARTICLE), 2002
The swiss-knife RFID distance bounding protocol
CH Kim, G Avoine, F Koeune, FX Standaert, O Pereira
International Conference on Information Security and Cryptology, 98-115, 2008
Adversarial Model for Radio Frequency Identification.
G Avoine
IACR Cryptology ePrint Archive 2005, 49, 2005
A framework for analyzing RFID distance bounding protocols
G Avoine, MA Bingöl, S Kardaş, C Lauradoux, B Martin
Journal of Computer Security 19 (2), 289-317, 2011
RFID distance bounding protocol with mixed challenges to prevent relay attacks
CH Kim, G Avoine
International Conference on Cryptology And Network Security, 119-133, 2009
An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement
G Avoine, A Tchamkerten
International Conference on Information Security, 250-261, 2009
Noisy tags: A pretty good key exchange protocol for RFID tags
C Castelluccia, G Avoine
International Conference on Smart Card Research and Advanced Applications …, 2006
Cryptography in radio frequency identification and fair exchange protocols
G Avoine
Verlag nicht ermittelbar, 2005
Privacy issues in RFID banknote protection schemes
G Avoine
Smart Card Research and Advanced Applications VI, 33-48, 2004
Adversary model for radio frequency identification
G Avoine
Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of …, 2005
Characterization and improvement of time-memory trade-off based on perfect tables
G Avoine, P Junod, P Oechslin
ACM Transactions on Information and System Security (TISSEC) 11 (4), 17, 2008
Cryptographie-Théorie et pratique/2ème édition
D Stinson, S Vaudenay, G Avoine, P Junod
vuibert, 2003
Security and privacy in RFID systems
G Avoine
Time-memory trade-offs: False alarm detection using checkpoints
G Avoine, P Junod, P Oechslin
International Conference on Cryptology in India, 183-196, 2005
The Poulidor distance-bounding protocol
R Trujillo-Rasua, B Martin, G Avoine
International Workshop on Radio Frequency Identification: Security and …, 2010
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
G Avoine, X Carpent, B Martin
Journal of Network and Computer Applications 35 (2), 826-843, 2012
epassport: Securing international contacts with contactless chips
G Avoine, K Kalach, JJ Quisquater
International Conference on Financial Cryptography and Data Security, 141-155, 2008
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20