RFID protocols

@inproceedings{DR11,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Insider attacks and privacy of {RFID} protocols},
  booktitle = {EuroPKI},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  year = {2011},
  note = {To appear}
}
@inproceedings{DMR11,
  author = {T. van Deursen and S. Mauw and S. Radomirovi\'c},
  title = {m{C}arve: {C}arving attributed dump sets},
  year = {2011},
  booktitle = {Proc.\ 20th USENIX Security Symposium},
  publisher = {USENIX Association},
  month = {August},
  note = {To appear},
}
@inproceedings{D11,
  author = {T. van Deursen},
  title = {50 Ways to Break {RFID} Privacy},
  booktitle = {Privacy and Identity 2010},
  publisher = {Springer},
  series = {IFIP AICT},
  volume = {352},
  pages = {192--205},
  year = {2011},
}
@inproceedings{DR10,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {{EC-RAC}: Enriching a Capacious {RFID} Attack Collection},
  year = {2010},
  booktitle = {6th Workshop on RFID Security (RFIDSec 2010)},
  series = {Lecture Notes in Computer Science},
  volume = {6370},
  pages = {75--90},
  publisher = {Springer},
  doi = {10.1007/978-3-642-16822-2_8},
}
@article{DR09d,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {On a new formal proof model for {RFID} location privacy},
  year = {2009},
  publisher = {Elsevier},
  journal = {Information Processing Letters},
  volume = {110},
  number = {2},
  pages = {57--61},
  doi = {10.1016/j.ipl.2009.10.007},
}
@inproceedings{DR09,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Algebraic Attacks on {RFID} Protocols},
  year = {2009},
  booktitle = {Information Security Theory and Practices. Smart Devices, Pervasive Systems, and Ubiquitous Networks (WISTP'09)},
  series = {Lecture Notes in Computer Science},
  volume = {5746},
  publisher = {Springer},
  note = {38--51},
}
@inproceedings{DMRV09,
  author = {T. van Deursen and S. Mauw and S. Radomirovi\'c and P. Vullers},
  title = {Secure ownership and ownership transfer in {RFID} systems},
  year = {2009},
  booktitle = {Proc.\ 14th European Symposium On Research In Computer Security (ESORICS'09)},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  volume = {5789},
  pages = {637--654},
}
@inproceedings{DR08,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Security of {RFID} Protocols -- {A} Case Study},
  month = {August},
  year = {2009},
  pages = {41--52},
  volume = {244},
  series = {ENTCS},
  publisher = {Elsevier},
  booktitle = {Proc.\ 4th International Workshop on Security and Trust Management (STM'08)},
  doi = {10.1016/j.entcs.2009.07.037}
}
@techreport{DR09b,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Untraceable {RFID} protocols are not trivially composable: {Attacks} on the revision of {EC-RAC}},
  year = {2009},
  institution = {University of Luxembourg},
  month = {July},
  note = {\url{http://eprint.iacr.org/2009/332}},
}
@techreport{DR09c,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Attacks on {RFID} protocols (version 1.1)},
  year = {2009},
  institution = {University of Luxembourg},
  month = {August},
  note = {\url{http://eprint.iacr.org/2008/310}},
}
@techreport{DR08f,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {On a new formal proof model for {RFID} Location Privacy},
  year = {2008},
  month = {November},
  note = {\url{http://eprint.iacr.org/2008/477}},
}
@inproceedings{DMR08,
  author = {T. van Deursen and S. Mauw and S. Radomirovi\'c},
  title = {Untraceability of {RFID} Protocols},
  year = {2008},
  pages = {1--15},
  booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP'08)},
  address = {Seville, Spain},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  volume = {5019},
}
@inproceedings{DR08a,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Security of an {RFID} Protocol for Supply Chains},
  month = {October},
  year = {2008},
  pages = {568--573},
  publisher = {IEEE Computer Society},
  booktitle = {Proc.\ 1st Workshop on Advances in RFID (AIR'08)},
}
@misc{DR08b,
  author = {T. van Deursen and S. Radomirovi\'c},
  title = {Vulnerabilities in {RFID} protocols due to algebraic properties},
  month = {November},
  year = {2008},
  howpublished = {3rd Benelux Workshop on Information and System Security},
}