-
3
-
-
33845920117
-
-
H. Eriger, H. Chabanne, and E. Dottax, HB++: A Lightweight Authentication Protocol Secure against Some Attacks, Proc. IEEE Int'l Conf. Pervasive Service, Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing (Percom '06), pp. 28-33,' 2006, doi:10.1109/SECPERU. 2006.10.
-
H. Eriger, H. Chabanne, and E. Dottax, "HB++: A Lightweight Authentication Protocol Secure against Some Attacks," Proc. IEEE Int'l Conf. Pervasive Service, Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing (Percom '06), pp. 28-33,' 2006, doi:10.1109/SECPERU. 2006.10.
-
-
-
-
4
-
-
36248949547
-
Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning
-
D.N. Due, J. Park, H. Lee, and K. Kim, "Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning," Proc. Symp. Cryptography and Information Security (SCIS), 2006.
-
(2006)
Proc. Symp. Cryptography and Information Security (SCIS)
-
-
Due, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
6
-
-
27644472569
-
An Active Attack Against HB+-A Provablv Secure Lightweight Authentication Protocol
-
doi:10.1049/el:20052622, Oct
-
H. Gibert, M. Robshaw, and H. Sibert, "An Active Attack Against HB+-A Provablv Secure Lightweight Authentication Protocol," IEE Electronics Letters, vol. 41, no. 21, pp. 1169-1170, Oct. 2005, doi:10.1049/el:20052622.
-
(2005)
IEE Electronics Letters
, vol.41
, Issue.21
, pp. 1169-1170
-
-
Gibert, H.1
Robshaw, M.2
Sibert, H.3
-
7
-
-
33751546328
-
Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards
-
doi:10.1016/j.csi.2006. 04.004
-
H.-Y. Chien and C.-H. Chen, "Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards," Computers Standards & Interfaces, vol. 29, no. 2, pp. 254-259, 2007, doi:10.1016/j.csi.2006. 04.004.
-
(2007)
Computers Standards & Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
8
-
-
33947538532
-
Protocols for RFID Tag/Reader Authentication
-
doi:10.1016/ j.dss.2007.01.003
-
S. Piramuthu, "Protocols for RFID Tag/Reader Authentication," Decision Support Systems, vol. 43, no. 3, pp. 897-914, 2007, doi:10.1016/ j.dss.2007.01.003.
-
(2007)
Decision Support Systems
, vol.43
, Issue.3
, pp. 897-914
-
-
Piramuthu, S.1
-
9
-
-
77952285870
-
Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements
-
Rev, July, doi: http://doi.acm.org/10.1145/ 1278901.1278916
-
H.-Y. Chien and C.-W. Huang, "Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements," ACM Operating System Rev., vol. 41, no. 2, pp. 83-86, July 2007, doi: http://doi.acm.org/10.1145/ 1278901.1278916.
-
(2007)
ACM Operating System
, vol.41
, Issue.2
, pp. 83-86
-
-
Chien, H.-Y.1
Huang, C.-W.2
-
12
-
-
36248971663
-
LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags
-
July
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags," Proc. Second Workshop RFID Security, July 2006.
-
(2006)
Proc. Second Workshop RFID Security
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
13
-
-
34548165793
-
EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags
-
Nov
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags," Proc. OTM Federated Conf. and Workshop: IS Worksliop, Nov. 2006.
-
(2006)
Proc. OTM Federated Conf. and Workshop: IS Worksliop
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
15
-
-
36248982045
-
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity
-
Oct.-Dec, doi: 10.1109/TDSC.2007.70226
-
H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 4, pp. 337-340, Oct.-Dec. 2007, doi: 10.1109/TDSC.2007.70226.
-
(2007)
IEEE Trans. Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
|