@inproceedings{DR11,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Insider attacks and privacy of {RFID} protocols},
booktitle = {EuroPKI},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
year = {2011},
note = {To appear}
}
@inproceedings{DMR11,
author = {T. van Deursen and S. Mauw and S. Radomirovi\'c},
title = {m{C}arve: {C}arving attributed dump sets},
year = {2011},
booktitle = {Proc.\ 20th USENIX Security Symposium},
publisher = {USENIX Association},
month = {August},
note = {To appear},
}
@inproceedings{D11,
author = {T. van Deursen},
title = {50 Ways to Break {RFID} Privacy},
booktitle = {Privacy and Identity 2010},
publisher = {Springer},
series = {IFIP AICT},
volume = {352},
pages = {192--205},
year = {2011},
}
@inproceedings{DR10,
author = {T. van Deursen and S. Radomirovi\'c},
title = {{EC-RAC}: Enriching a Capacious {RFID} Attack Collection},
year = {2010},
booktitle = {6th Workshop on RFID Security (RFIDSec 2010)},
series = {Lecture Notes in Computer Science},
volume = {6370},
pages = {75--90},
publisher = {Springer},
doi = {10.1007/978-3-642-16822-2_8},
}
@article{DR09d,
author = {T. van Deursen and S. Radomirovi\'c},
title = {On a new formal proof model for {RFID} location privacy},
year = {2009},
publisher = {Elsevier},
journal = {Information Processing Letters},
volume = {110},
number = {2},
pages = {57--61},
doi = {10.1016/j.ipl.2009.10.007},
}
@inproceedings{DR09,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Algebraic Attacks on {RFID} Protocols},
year = {2009},
booktitle = {Information Security Theory and Practices. Smart Devices, Pervasive Systems, and Ubiquitous Networks (WISTP'09)},
series = {Lecture Notes in Computer Science},
volume = {5746},
publisher = {Springer},
note = {38--51},
}
@inproceedings{DMRV09,
author = {T. van Deursen and S. Mauw and S. Radomirovi\'c and P. Vullers},
title = {Secure ownership and ownership transfer in {RFID} systems},
year = {2009},
booktitle = {Proc.\ 14th European Symposium On Research In Computer Security (ESORICS'09)},
series = {Lecture Notes in Computer Science},
publisher = {Springer},
volume = {5789},
pages = {637--654},
}
@inproceedings{DR08,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Security of {RFID} Protocols -- {A} Case Study},
month = {August},
year = {2009},
pages = {41--52},
volume = {244},
series = {ENTCS},
publisher = {Elsevier},
booktitle = {Proc.\ 4th International Workshop on Security and Trust Management (STM'08)},
doi = {10.1016/j.entcs.2009.07.037}
}
@techreport{DR09b,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Untraceable {RFID} protocols are not trivially composable: {Attacks} on the revision of {EC-RAC}},
year = {2009},
institution = {University of Luxembourg},
month = {July},
note = {\url{http://eprint.iacr.org/2009/332}},
}
@techreport{DR09c,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Attacks on {RFID} protocols (version 1.1)},
year = {2009},
institution = {University of Luxembourg},
month = {August},
note = {\url{http://eprint.iacr.org/2008/310}},
}
@techreport{DR08f,
author = {T. van Deursen and S. Radomirovi\'c},
title = {On a new formal proof model for {RFID} Location Privacy},
year = {2008},
month = {November},
note = {\url{http://eprint.iacr.org/2008/477}},
}
@inproceedings{DMR08,
author = {T. van Deursen and S. Mauw and S. Radomirovi\'c},
title = {Untraceability of {RFID} Protocols},
year = {2008},
pages = {1--15},
booktitle = {Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP'08)},
address = {Seville, Spain},
series = {Lecture Notes in Computer Science},
publisher = {Springer},
volume = {5019},
}
@inproceedings{DR08a,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Security of an {RFID} Protocol for Supply Chains},
month = {October},
year = {2008},
pages = {568--573},
publisher = {IEEE Computer Society},
booktitle = {Proc.\ 1st Workshop on Advances in RFID (AIR'08)},
}
@misc{DR08b,
author = {T. van Deursen and S. Radomirovi\'c},
title = {Vulnerabilities in {RFID} protocols due to algebraic properties},
month = {November},
year = {2008},
howpublished = {3rd Benelux Workshop on Information and System Security},
}