-
2
-
-
78751648498
-
-
EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1.2.0, EPCglobal Inc., October 2008
-
EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1.2.0, EPCglobal Inc., October 2008.
-
-
-
-
3
-
-
33144457479
-
RFID security and privacy: A research survey
-
A. Juels RFID security and privacy: a research survey Selected Areas in Communications 24 2 2006 381 394 February
-
(2006)
Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
5
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
T. Dimitriou, A lightweight RFID protocol to protect against traceability and cloning attacks, in: Proc. Of SecureComm'05, September 2005, pp. 59-66.
-
(2005)
Proc. of SecureComm'05, September
, pp. 59-66
-
-
Dimitriou, T.1
-
6
-
-
33749379761
-
Mutual authentication protocol for low-cost RFID
-
J. Yang, J. Park, H. Lee, K. Ren, K. Kim, Mutual authentication protocol for low-cost RFID, in: Proceedings of the Workshop on RFID and Lightweight Cryptography, July 2005, pp. 17-24.
-
(2005)
Proceedings of the Workshop on RFID and Lightweight Cryptography, July
, pp. 17-24
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
-
7
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S. Weis, S. Sarma, R. Rivest, D. Engels, Security and privacy aspects of low-cost radio frequency identification systems, in: International Conference on Security in Pervasive Computing, March 2003, pp. 201-212.
-
(2003)
International Conference on Security in Pervasive Computing, March
, pp. 201-212
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
8
-
-
35248872610
-
RFID systems and security and privacy implications, cryptographic hardware and embedded systems - CHES 2002
-
Springer
-
S.A. Sarma, S.E. Weis, and D.W. Engels RFID systems and security and privacy implications, cryptographic hardware and embedded systems - CHES 2002 LNCS vol. 2523 2002 Springer August, pp. 454-469
-
(2002)
LNCS
, vol.2523
-
-
Sarma, S.A.1
Weis, S.E.2
Engels, D.W.3
-
11
-
-
47949110430
-
A privacy-preserving lightweight authentication protocol for low-cost RFID tags
-
S. Yu, K. Ren, W. Lou, A privacy-preserving lightweight authentication protocol for low-cost RFID tags, in: IEEE MILCOM 2007, October 2007, pp. 1-7.
-
(2007)
IEEE MILCOM 2007, October
, pp. 1-7
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
12
-
-
49049105768
-
HB-MP + protocol: An improvement on the HB-MP protocol
-
Xuefei Leng, Keith Mayes, Konstantinos Markantonakis, HB-MP + protocol: an improvement on the HB-MP protocol, in: IEEE International Conference on RFID, April 2008, pp. 118-124.
-
(2008)
IEEE International Conference on RFID, April
, pp. 118-124
-
-
Leng, X.1
Mayes, K.2
Markantonakis, K.3
-
14
-
-
57849121129
-
A survey of RFID authentication protocols based on hash-chain method
-
November
-
Irfan Syamsuddin, Tharam Dillon, Elizabeth Chang, Song Han, A survey of RFID authentication protocols based on hash-chain method, in: Third International Conference on Convergence and Hybrid Information Technology - ICCIT 2008, vol. 2, November 2008, pp. 559-564.
-
(2008)
Third International Conference on Convergence and Hybrid Information Technology - ICCIT 2008
, vol.2
, pp. 559-564
-
-
Syamsuddin, I.1
Dillon, T.2
Chang, E.3
Han, S.4
-
15
-
-
57849111802
-
An improvement on RFID authentication protocol with privacy protection
-
November
-
Y.-C. Lee, Y.-C. Hsieh, P.-S. You, T.-C. Chen, An improvement on RFID authentication protocol with privacy protection, in: Third International Conference on Convergence and Hybrid Information Technology - ICCIT 2008, vol. 2, November 2008, pp. 569-573.
-
(2008)
Third International Conference on Convergence and Hybrid Information Technology - ICCIT 2008
, vol.2
, pp. 569-573
-
-
Lee, Y.-C.1
Hsieh, Y.-C.2
You, P.-S.3
Chen, T.-C.4
-
16
-
-
41549156956
-
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
-
April
-
Jihwan Lim, Heekuck Oh, SangJin Kim, A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection, ISPEC 2008, LNCS, vol. 4991, April 2008, pp. 278-289.
-
(2008)
ISPEC 2008, LNCS
, vol.4991
, pp. 278-289
-
-
Lim, J.1
Oh, H.2
Kim, S.3
-
17
-
-
49049105769
-
Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications
-
Srinivas Devadas, G. Edward Suh, Sid Praal, Richard Sowell, Thomas Ziola, Vivek Khandelwal, Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications, in: Proceedings of the IEEE International Conference on RFID, April 2008, pp. 58-64.
-
(2008)
Proceedings of the IEEE International Conference on RFID, April
, pp. 58-64
-
-
Devadas, S.1
Edward Suh, G.2
Praal, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
18
-
-
52249124172
-
An analysis of RFID tag authentication protocols using secret value
-
December
-
J.S. Cho, S.S. Yeo, S.K. Kim, An analysis of RFID tag authentication protocols using secret value, in: 2007 International Conference on Future Generation Communication and Networking (FGCN 2007), vol. 1, December 2007, pp. 481-486.
-
(2007)
2007 International Conference on Future Generation Communication and Networking (FGCN 2007)
, vol.1
, pp. 481-486
-
-
Cho, J.S.1
Yeo, S.S.2
Kim, S.K.3
-
19
-
-
14244253910
-
An approach to security and privacy of RFID system for supply chain
-
X. Gao, Z. Xiang, H. Wang, J. Shen, J. Huang, S. Song, An approach to security and privacy of RFID system for supply chain, in: Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, 2004, pp. 164-168.
-
(2004)
Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business
, pp. 164-168
-
-
Gao, X.1
Xiang, Z.2
Wang, H.3
Shen, J.4
Huang, J.5
Song, S.6
-
20
-
-
34347225586
-
RFID authentication protocol for anti-counterfeiting and privacy protection
-
Y.C. Chen, W.L. Wang, M.S. Hwang, RFID authentication protocol for anti-counterfeiting and privacy protection, in: Proceedings of the 9th International Conference on Advanced Communication Technology, ICACT2007, pp. 255-259.
-
Proceedings of the 9th International Conference on Advanced Communication Technology, ICACT2007
, pp. 255-259
-
-
Chen, Y.C.1
Wang, W.L.2
Hwang, M.S.3
-
21
-
-
24944575863
-
Cryptographic approach to "privacy-friendly" tags
-
MIT, MA, USA, November
-
M. Ohkubo, K. Suzuki, S. Kinoshita, Cryptographic approach to "privacy-friendly" tags, in: RFID Privacy Workshop, MIT, MA, USA, November 2003.
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
|