-
1
-
-
79952409186
-
-
EPCglobal
-
EPCglobal,http://www.EPCglobalinc.org/
-
-
-
-
2
-
-
79952379603
-
Enhancing Security of EPCglobal EPC Class 1 Generation 2 RFID Tag against Traceability and Cloning
-
Berlin: Springer
-
D N Duc, J Park, H Lee, K Kim. Enhancing Security of EPCglobal EPC Class 1 Generation 2 RFID Tag against Traceability and Cloning, The 2006 Symposium on Cryptography and Information Security. Berlin: Springer, 2006.
-
The 2006 Symposium On Cryptography and Information Security
, pp. 2006
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
4
-
-
79952398933
-
-
In RFID Privacy Workshop, MIT, MA, USA
-
M Ohkubo, K Suzki, S Kinoshita. Cryptographic approach to "Privacy-Friendly" Tags[C]. In RFID Privacy Workshop, MIT, MA, USA, 2003.http://www.rfidprivacy.us/2003/agenda.php.
-
(2003)
Cryptographic Approach to "Privacy-Friendly" Tags[C]
-
-
Ohkubo, M.1
Suzki, K.2
Kinoshita, S.3
-
7
-
-
21144438831
-
Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[C]
-
Berlin: Springer
-
S Weis, S Sarma, R Rivest, D W Engels. Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[C], In Proceedings of the First Security in Pervasive Computing. Berlin: Springer, 2003: 454-469.
-
(2003)
In Proceedings of the First Security In Pervasive Computing
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.W.4
-
8
-
-
79952371517
-
-
MD5, SHA-1, SHA-256 Hash core for Asic
-
Datasheet Helion Technology. MD5, SHA-1, SHA-256 Hash core for Asic. http://www.heliontech.com, 2005.
-
(2005)
Datasheet Helion Technology
-
-
-
10
-
-
33751546328
-
Mutual authentication Protocol for RFID Conforming to EPC Class 1 Generation-2 Standard
-
H Chien, C Chen. Mutual authentication Protocol for RFID Conforming to EPC Class 1 Generation-2 Standard, Computer Standards & Interfaces, 2007.29(2):254-259
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.1
Chen, C.2
-
11
-
-
79952382310
-
How to Ensure Forward and Backward Security of RFID Identification Schemes by Using a Robust PRBG
-
Report 2008/201
-
J Wu, D Stinson. How to Ensure Forward and Backward Security of RFID Identification Schemes by Using a Robust PRBG. Cryptology ePrint Archive, Report 2008/201, 2008. http://eprint.iacr.org/.
-
(2008)
Cryptology EPrint Archive
-
-
Wu, J.1
Stinson, D.2
-
12
-
-
58449131289
-
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification [J]
-
P Pedro, C Julio, M Juan, A Ribagorda. An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification [J]. J. Inf. Sci. Eng.2009. 25(1): 33-57
-
(2009)
J. Inf. Sci. Eng
, vol.25
, Issue.1
, pp. 33-57
-
-
Pedro, P.1
Julio, C.2
Juan, M.3
Ribagorda, A.4
-
14
-
-
70350572865
-
Conformation of EPC Class 1 Generation 2 Standards RFID system with Mutual Authentication and Privacy Protection [J]
-
In Press, doi:10.1016/j.engappai
-
C Chen, Y Deng. Conformation of EPC Class 1 Generation 2 Standards RFID system with Mutual Authentication and Privacy Protection [J]. Engineering Applications of Artificial Intelligence,In Press, doi:10.1016/j.engappai.2008.10.022
-
(2008)
Engineering Applications of Artificial Intelligence
, vol.10
, pp. 022
-
-
Chen, C.1
Deng, Y.2
-
15
-
-
55749110412
-
-
In Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management
-
Q Cai, Y Zhan, Y Wang. A Minimalist Mutual Authentication Protocol for RFID system and BAN logic Analysis[C]. In Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management.2008.2: 449-453
-
(2008)
A Minimalist Mutual Authentication Protocol For RFID System and BAN Logic Analysis[C]
, vol.2
, pp. 449-453
-
-
Cai, Q.1
Zhan, Y.2
Wang, Y.3
-
16
-
-
68949181328
-
Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID Systems [J]
-
E Choi, D Lee, J Lim. Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID Systems [J]. Computer Standards & Interfaces.2009.31(6):1124-1130
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.6
, pp. 1124-1130
-
-
Choi, E.1
Lim, J.2
-
17
-
-
67649484364
-
A Gen2-based RFID Authentication Protocol for Security and Privacy[C]
-
H Sun, W Ting. A Gen2-based RFID Authentication Protocol for Security and Privacy[C]. IEEE Transactions on Mobile Computing.2009.8(8):1052-1062
-
(2009)
IEEE Transactions On Mobile Computing
, vol.8
, Issue.8
, pp. 1052-1062
-
-
Sun, H.1
Ting, W.2
-
18
-
-
64249134316
-
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
-
D Han, D Kwon. "Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards" Computer Standards & Interfaces[J]. 2009.31(4):648-652
-
(2009)
Computer Standards & Interfaces[J]
, vol.31
, Issue.4
, pp. 648-652
-
-
Han, D.1
Kwon, D.2
-
20
-
-
79952383750
-
-
AVISPA
-
AVISPA v1.1 User Manual, 2006
-
(2006)
User Manual
, vol.1
-
-
|