-
1
-
-
33745597876
-
A Scalable, Delegatable Pseudonym Protocol. Enabling Ownership Transfer of RFID Tags
-
D. Molnar, A. Soppera, and D. Wagner, "A Scalable, Delegatable Pseudonym Protocol. Enabling Ownership Transfer of RFID Tags", Selected Areas in Cryptography, 2005, pp. 276-290.
-
(2005)
Selected Areas in Cryptography
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
2
-
-
84977783611
-
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
-
ICICS 2006
-
C. H. Lim, T. Kwon , "Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer", In ICICS 2006, volume 4307 of LNCS, pp. 1-20.
-
LNCS
, vol.4307
, pp. 1-20
-
-
Lim, C.H.1
Kwon, T.2
-
3
-
-
35048904109
-
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags
-
EUC 2004
-
J. Saito, J. C. Ryou, and K. Sakurai, "Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags", In EUC 2004, volume 3207 of LNCS, pp. 879-890.
-
LNCS
, vol.3207
, pp. 879-890
-
-
Saito, J.1
Ryou, J.C.2
Sakurai, K.3
-
4
-
-
24644501824
-
Challenge-response Based RFID Authentication Protocol for Distributed Database Environment
-
SPC 2005
-
K. Rhee, J. Kwak, and S. Kim, et al, "Challenge-response Based RFID Authentication Protocol for Distributed Database Environment", In SPC 2005, volume 3450 of LNCS, pp. 70-84.
-
LNCS
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
-
6
-
-
38949143633
-
Robust Mutual Authentication for Low-cost RFID Systems
-
S. Tripathy, S. Nandi, "Robust Mutual Authentication for Low-cost RFID Systems," 2006 IEEE International Conference on Industrial Informatics, Aug., 2006, pp. 949-954.
-
2006 IEEE International Conference on Industrial Informatics, Aug., 2006
, pp. 949-954
-
-
Tripathy, S.1
Nandi, S.2
-
7
-
-
33749379761
-
Mutual Authentication Protocol for Low-cost RFID
-
J. Yang, J. Park, and H. Lee, et al, "Mutual Authentication Protocol for Low-cost RFID," In Proceedings of Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005, pp. 17-24.
-
Proceedings of Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005
, pp. 17-24
-
-
Yang, J.1
Park, J.2
Lee, H.3
-
8
-
-
33745926180
-
New Security Problem in RFID Systems 'Tag Killing'
-
ACIS 2006
-
D. G. Han, T. Takagi, and H. W. Kim, et al, "New Security Problem in RFID Systems 'Tag Killing'", In ACIS 2006, volume 3982 of LNCS, pp. 375-384.
-
LNCS
, vol.3982
, pp. 375-384
-
-
Han, D.G.1
Takagi, T.2
Kim, H.W.3
-
9
-
-
57849132720
-
Survey and Remedy of Mutual Authentication Protocols for RFID System
-
Albert Jeng, Li-Chung Chang, and Huang-Kuan Ho, "Survey and Remedy of Mutual Authentication Protocols for RFID System", In Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, 2008, pp. 3361-3366.
-
Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, 2008
, pp. 3361-3366
-
-
Jeng, A.1
Chang, L.-C.2
Ho, H.-K.3
-
10
-
-
57049150751
-
A Study on Secure RFID Mutual Authentication Scheme in Pervasive
-
doi:10.1016/j.comcom.2008.05.006
-
Soo-Young Kang, Deok-Gyu Lee, and Im-Yeong Lee "A Study on Secure RFID Mutual Authentication Scheme in Pervasive", Comput. Com mun., 2008, doi:10.1016/j.comcom.2008.05.006.
-
(2008)
Comput. Com Mun.
-
-
Kang, S.-Y.1
Lee, D.-G.2
Lee, I.-Y.3
-
11
-
-
38949212887
-
Owner transferable privacy protection scheme for RFID tags
-
CSS 2005
-
J. Saito, K. Sakurai, "Owner transferable privacy protection scheme for RFID tags", In CSS 2005, volume 2005 of IPSJ Symposium Series, pp.283-288.
-
IPSJ Symposium Series
, vol.2005
, pp. 283-288
-
-
Saito, J.1
Sakurai, K.2
-
12
-
-
57149100147
-
An Efficient and Secure RFID Security Method with Ownership Transfer
-
K. Osaka, T. Takagi, K. Yamazaki and O. Takahash, "An Efficient and Secure RFID Security Method with Ownership Transfer," Computational Intelligence and Security, 2006, vol. 2, pp. 1090-1095.
-
(2006)
Computational Intelligence and Security
, vol.2
, pp. 1090-1095
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahash, O.4
|