-
1
-
-
1942500391
-
Enabling ubiquitous sensing with RFID
-
Apr.
-
R. Want, "Enabling ubiquitous sensing with RFID," Computer, vol.37, no.4, pp. 84-86, Apr. 2004.
-
(2004)
Computer
, vol.37
, Issue.4
, pp. 84-86
-
-
Want, R.1
-
2
-
-
30344439619
-
-
S. Garfinkel and B. Rosenberg, Eds. Reading, MA: Addison-Wesley, Jul
-
S. Garfinkel and B. Rosenberg, Eds., RFID : Applications, Security, and Privacy. Reading, MA: Addison-Wesley, Jul. 2005.
-
(2005)
RFID : Applications, Security, and Privacy
-
-
-
3
-
-
52949100457
-
An efficient localization scheme for a differential-driving mobile robot based on RFID system
-
Dec.
-
S. Han, H. Lim, and J. Lee, "An efficient localization scheme for a differential-driving mobile robot based on RFID system," IEEE Trans. Ind. Electron., vol.53, no.5, pp. 3362-3369, Dec. 2007.
-
(2007)
IEEE Trans. Ind. Electron.
, vol.53
, Issue.5
, pp. 3362-3369
-
-
Han, S.1
Lim, H.2
Lee, J.3
-
4
-
-
77951173171
-
-
Class 1 Generation 2 UHF Air interface Protocol Standard. [Online]. Available:
-
Class 1 Generation 2 UHF Air interface Protocol Standard. [Online]. Available: http://www.epcglobalinc.org/standards/
-
-
-
-
7
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
May/Jun.
-
S. L. Garfinkel, A. Juels, and R. Pappu, "RFID privacy: An overview of problems and proposed solutions," IEEE Security Privacy, vol.3, no.3, pp. 34-43, May/Jun. 2005.
-
(2005)
IEEE Security Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
8
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
A. W. Stcphcn, E. S. Sanjay, L. R. Ronald, and W. E. Daniel, "Security and privacy aspects of low-cost radio frequency identification systems," Security Pervasive Comput., vol.2802, pp. 201-212, 2004.
-
(2004)
Security Pervasive Comput
, vol.2802
, pp. 201-212
-
-
Stcphcn, A.W.1
Sanjay, E.S.2
Ronald, L.R.3
Daniel, W.E.4
-
9
-
-
67651156317
-
An efficient reader anticollision algorithm in dense RFID networks with mobile RFID read
-
Jul.
-
J.-B. Eom, S.-B. Yim, and T.-J. Lee, "An efficient reader anticollision algorithm in dense RFID networks with mobile RFID read," IEEE Trans. Ind. Electron., vol.56, no.7, pp. 2326-2336, Jul. 2009.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.7
, pp. 2326-2336
-
-
Eom, J.-B.1
Yim, S.-B.2
Lee, T.-J.3
-
10
-
-
62349124225
-
A simple and cost effective RFID tag-reader mutual authentication scheme
-
Jul.
-
D. M. Konidala, Z. Kim, and K. Kim, "A simple and cost effective RFID tag-reader mutual authentication scheme," in Proc. Int. Conf. RFIDSec, Jul. 2007, pp. 141-152.
-
(2007)
Proc. Int. Conf. RFIDSec
, pp. 141-152
-
-
Konidala, D.M.1
Kim, Z.2
Kim, K.3
-
11
-
-
63149124281
-
Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard
-
Jul.
-
P. Peris-Lopez, T. Li, L. Lim, J. C. Hernandez-Castro, and J. M. Estevez- Tapiador, "Vulnerability analysis of a mutual authentication scheme under the EPC class-1 generation-2 standard," in Proc. RFIDSec, Jul. 2008, pp. 52-63.
-
(2008)
Proc. RFIDSec
, pp. 52-63
-
-
Peris-Lopez, P.1
Li, T.2
Lim, L.3
Hernandez-Castro, J.C.4
Estevez- Tapiador, J.M.5
-
12
-
-
63149140885
-
Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework
-
Dec. 17-20
-
P. Peris-Lopez, T.-L. Lim, and T. Li, "Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework," in Proc. IEEE/IFIP Int. Conf. EUC, Dec. 17-20, 2008, vol.2, pp. 159-166.
-
(2008)
Proc. IEEE/IFIP Int. Conf. EUC
, vol.2
, pp. 159-166
-
-
Peris-Lopez, P.1
Lim, T.-L.2
Li, T.3
-
13
-
-
33144457479
-
RFID security and privacy: A research survey
-
Feb.
-
A. Juels, "RFID security and privacy: A research survey," IEEE J. Sel. Areas Commun., vol.24, no.2, pp. 381-394, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
14
-
-
33947538532
-
Protocols for RFID tag/reader authentication
-
Apr.
-
S. Piramuthu, "Protocols for RFID tag/reader authentication," Decis. Support Sys,., vol.43, no.3, pp. 897-914, Apr. 2007.
-
(2007)
Decis. Support Sys
, vol.43
, Issue.3
, pp. 897-914
-
-
Piramuthu, S.1
-
15
-
-
33750291916
-
RFID systems: A survey on security threats and proposed solutions
-
Proc. PWC
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Rib-agorda, "RFID systems: A survey on security threats and proposed solutions," in Proc. PWC, vol.4217, LNCS, 2006, pp. 159-170.
-
(2006)
LNCS
, vol.4217
, pp. 159-170
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Rib-Agorda, A.4
-
16
-
-
67651156316
-
Effects of reader-toreader interference on the UHF RFID interrogation Ra
-
Jul.
-
D.-Y. Kim, H.-G. Yoon, B.-J. Jang, and J.-G. Yook, "Effects of reader-toreader interference on the UHF RFID interrogation Ra," IEEE Trans. Ind. Electron., vol.56, no.7, pp. 2337-2346, Jul. 2009.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.7
, pp. 2337-2346
-
-
Kim, D.-Y.1
Yoon, H.-G.2
Jang, B.-J.3
Yook, J.-G.4
-
17
-
-
26444443915
-
A scalable and provably secure hash based RFID protocol
-
Mar.
-
G. Avoine and P. Oechslin, "A scalable and provably secure hash based RFID protocol," in Proc. PerCom Workshops, Mar. 2005, pp. 110-114.
-
(2005)
Proc. PerCom Workshops
, pp. 110-114
-
-
Avoine, G.1
Oechslin, P.2
-
18
-
-
33744940544
-
Efficient RFID authentication protocol for ubiquitous computing environment
-
Proc. EUC Workshops, Berlin, Germany
-
E. Y. Choi, S. M. Lee, and D. H. Lee, "Efficient RFID authentication protocol for ubiquitous computing environment," in Proc. EUC Workshops, vol.3823, LNCS, Berlin, Germany, 2005, pp. 945-954.
-
(2005)
LNCS
, vol.3823
, pp. 945-954
-
-
Choi, E.Y.1
Lee, S.M.2
Lee, D.H.3
-
19
-
-
34247218520
-
RFID mutual authentication scheme based on synchronized secret information
-
Jan.
-
S. Lee, T. Asano, and K. Kim, "RFID mutual authentication scheme based on synchronized secret information," in Proc. Symp. Cryptography Inf. Security, Hiroshima, Japan, Jan. 2006, pp. 17-20.
-
(2006)
Proc. Symp. Cryptography Inf. Security, Hiroshima, Japan
, pp. 17-20
-
-
Lee, S.1
Asano, T.2
Kim, K.3
-
20
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
Proc. SCN, Berlin, Germany
-
A. Juels, "Minimalist cryptography for low-cost RFID tags," in Proc. SCN, LNCS, Berlin, Germany, 2004, vol.3352, pp. 149-164.
-
(2004)
LNCS
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
21
-
-
33644534001
-
Lightweight authentication protocols for low-cost RFID tags
-
[Online]. Available
-
I. Vajda and L. Butty'an, "Lightweight authentication protocols for low-cost RFID tags," in Proc. 2nd Workshop Security Ubicomp, 2003, pp. 1-10. [Online]. Available: http://www.vs.inf.ethz.ch/events/ ubicomp2003sec/abstracts.html
-
(2003)
Proc. 2nd Workshop Security Ubicomp
, pp. 1-10
-
-
Vajda, I.1
Butty'An, L.2
-
22
-
-
36248971663
-
LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags
-
Jul. [Online]. Available
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags," in Proc. 2nd Workshop RFID Security, Jul. 2006, pp. 1-12. [Online]. Available: http://events.iaik.tugraz.at/ RFIDSec06/Program/ index.htm
-
(2006)
Proc. 2nd Workshop RFID Security
, pp. 1-12
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
23
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
Oct.-Dec.
-
H.-Y. Chien, "SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity," IEEE Trans. Dependable Secure Comput., vol.4, no.4, pp. 337-340, Oct.-Dec. 2007.
-
(2007)
IEEE Trans. Dependable Secure Comput.
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
24
-
-
37149018890
-
A survey of lightweight-cryptography implementations
-
Nov.
-
A. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel, "A survey of lightweight-cryptography implementations," IEEE Design Test, vol.24, no.6, pp. 522-533, Nov. 2007.
-
(2007)
IEEE Design Test
, vol.24
, Issue.6
, pp. 522-533
-
-
Eisenbarth, A.1
Kumar, S.2
Paar, C.3
Poschmann, A.4
Uhsadel, L.5
-
25
-
-
69649103859
-
The design of encoding architecture for UHF RFID applications
-
Hong Kong, Dec. 16-19, DOI: 10.1109/ APMC.2008.4958410
-
C.-C. Yuan, K.-H. Huang, H.-L. Li, and Y.-J. Huang, "The design of encoding architecture for UHF RFID applications," in Proc. Asia-Pacific Microw. Conf., Hong Kong, Dec. 16-19, 2008, pp. 1-4. DOI: 10.1109/ APMC.2008.4958410.
-
(2008)
Proc. Asia-Pacific Microw. Conf.
, pp. 1-4
-
-
Yuan, C.-C.1
Huang, K.-H.2
Li, H.-L.3
Huang, Y.-J.4
|