-
1
-
-
35248872610
-
RFID systems and security and privacy implications
-
Workshop on Cryptographic Hardware and Em-bedded Systems, volume, MIT
-
S. Sarma, S. Weis, and D. Engels, "RFID systems and security and privacy implications," In Workshop on Cryptographic Hardware and Em-bedded Systems, volume 2523 of Lecture Notes in omputer Science, MIT, pp. 454-470, 2002.
-
(2002)
Lecture Notes in Omputer Science
, vol.2523
, pp. 454-470
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
2
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
International Conference on Security in Pervasive Computing(SPC 2003) , Berlin: Springer-Verlag
-
S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems, " International Conference on Security in Pervasive Computing(SPC 2003),volume 2802 of Lecure Notes in Computer Science,Berlin: Springer-Verlag, pp. 201-212, 2003.
-
(2003)
Lecure Notes in Computer Science
, vol.2802
, pp. 201-212
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
3
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
International Conference on Security in Pervasive Computing(SPC 2005), Berlin: Springer-Verlag
-
K. Rhee, J. Kwak, S. Kim, and D. Won,"Challenge-response based RFID authentication protocol for distributed database environment,"International Conference on Security in Pervasive Computing(SPC 2005),volume 3450 of Lecure Notes in Computer Science,Berlin: Springer-Verlag, pp.70-84,2005.
-
(2005)
Lecure Notes in Computer Science
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
4
-
-
14244253910
-
An approach to security and privacy of rfid system for supply chain
-
X. Gao, Z. Xiang, H. Wang, J. Shen, J. Huang and S. Song, "An Approach to Security and Privacy of RFID System for Supply Chain, "Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04), pp. 164-168, 2004.
-
(2004)
Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04)
, pp. 164-168
-
-
Gao, X.1
Xiang, Z.2
Wang, H.3
Shen, J.4
Huang, J.5
Song, S.6
-
5
-
-
34347225586
-
RFID authentication protocol for anti-counterfeiting and privacy protection
-
Y.C.Chen, W.L.Wang and M.S.Hwang, "RFID Authentication Protocol for Anti-counterfeiting and Privacy Protection," Proceedings of the 9th International Conference on Advanced Communication Technology, ICACT2007, vol.1, pp. 255-259.
-
Proceedings of the 9th International Conference on Advanced Communication Technology, ICACT2007
, vol.1
, pp. 255-259
-
-
Chen, Y.C.1
Wang, W.L.2
Hwang, M.S.3
-
6
-
-
57849111802
-
An improvement on RFID authentication protocol with privacy protection
-
South Korea: Busan
-
Y.C.Lee, Y.C.Hsieh, P.S.You and T.C.Chen, "An Improvement on RFID Authentication Protocol with Privacy Protection," Third 2008 International Conference on Convergence and Hybrid InformationTechnology, South Korea: Busan, vol.2, pp. 569-573, 2008.
-
(2008)
Third 2008 International Conference on Convergence and Hybrid InformationTechnology
, vol.2
, pp. 569-573
-
-
Lee, Y.C.1
Hsieh, Y.C.2
You, P.S.3
Chen, T.C.4
-
7
-
-
65349109748
-
Research on hash-based RFID security authentication protocol
-
Beijing. (in Chinese)
-
Ding Zhenhua, Li Jintao and Feng Bo, "Research on Hash-Based RFID Security Authentication Protocol," Journal OF Computer research and development, Beijing, vol.46, pp.583-592, 2009. (in Chinese)
-
(2009)
Journal of Computer Research and Development
, vol.46
, pp. 583-592
-
-
Ding, Z.1
Li, J.2
Feng, B.3
-
8
-
-
34250631302
-
An anti-collision RFID algorithm based on the dynamic binary
-
Shanghai. (in Chinese)
-
Ju Weicheng and Yu Chengfang, "An Anti-Collision RFID Algorithm Based on the Dynamic Binary," Journal OF FuDan University, Shanghai, vol.44, p.46-50, 2005. (in Chinese)
-
(2005)
Journal of FuDan University
, vol.44
, pp. 46-50
-
-
Ju, W.1
Yu, C.2
|