-
1
-
-
77949553535
-
Cryptanalysis of two RFID authentication protocols
-
July
-
T. Cao and P. Shen, "Cryptanalysis of two RFID authentication protocols," International Journal of Network Security, vol. 9, no. 1, pp. 95-100, July 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.1
, pp. 95-100
-
-
Cao, T.1
Shen, P.2
-
2
-
-
20844459862
-
RFID privacy: An overview of problems and proposed Solutions
-
S. L. Garfinkel, A. Juels, and R. Pappu, "RFID privacy: An overview of problems and proposed Solutions," IEEE Security & Privacy Magazine, vol. 3, no. 3, pp. 34-43, 2005.
-
(2005)
IEEE Security & Privacy Magazine
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
3
-
-
52949100457
-
An efficient localization scheme for a differential-driving mobile robot based on RFID system
-
S. Han, H. Lim, and J. Lee, "An efficient localization scheme for a differential-driving mobile robot based on RFID system,"IEEE Transations on Industrial Electronics, vol. 54, no. 6, pp. 3362-3369, 2007.
-
(2007)
IEEE Transations on Industrial Electronics
, vol.54
, Issue.6
, pp. 3362-3369
-
-
Han, S.1
Lim, H.2
Lee, J.3
-
4
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
Mar
-
A. D. Henrici and P. Maüller, "Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers," Proceedings of PerSec' 04, pp. 149-153, Mar., 2004.
-
(2004)
Proceedings of PerSec' 04
, pp. 149-153
-
-
Henrici, A.D.1
Maüller, P.2
-
6
-
-
80054054775
-
-
(http://www.epcglobalinc.org/)
-
-
-
-
7
-
-
80054067859
-
-
(http://www.epcglobalinc.org/standards/uhfc1g2)
-
-
-
-
9
-
-
35248846439
-
An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism
-
K. H. S. S. Koralalage, M. R. Selim, J. Miura, Y. Goto, and J. Cheng, "An approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism," Proceedings of ACM Symposium on Applied Computing, pp. 270-275, 2007.
-
(2007)
Proceedings of ACM Symposium on Applied Computing
, pp. 270-275
-
-
Koralalage, K.H.S.S.1
Selim, M.R.2
Miura, J.3
Goto, Y.4
Cheng, J.5
-
10
-
-
33745597876
-
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
-
D. Molnar, A. Soppera, and D. Wagner, "A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags," Selected Areas in Cryptography, pp. 276-290, 2005.
-
(2005)
Selected Areas in Cryptography
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
11
-
-
85012989086
-
An efficient and secure RFID security method with ownership transfer
-
K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, "An efficient and secure RFID security method with ownership transfer," Proceedings of IEEE International Conference on Computational Intelligence and Security, vol. 2, pp. 3-6, 2006.
-
(2006)
Proceedings of IEEE International Conference on Computational Intelligence and Security
, vol.2
, pp. 3-6
-
-
Osaka, K.1
Takagi, T.2
Yamazaki, K.3
Takahashi, O.4
-
12
-
-
35048904109
-
Enhancing privacy of universal re-encryption scheme for RFID tags
-
LNCS, 3207
-
J. Saito, J. C. Ryou, and K. Sakurai, "Enhancing privacy of universal re-encryption scheme for RFID tags," Proceedings of EUC'2004, LNCS 3207, pp. 879-890, 2004.
-
(2004)
Proceedings of EUC'2004
, pp. 879-890
-
-
Saito, J.1
Ryou, J.C.2
Sakurai, K.3
-
13
-
-
59249086568
-
A lightweight protocol enabling ownership transfer and granular data access of RFID tags
-
Y. Seo, T. Asano, H. Lee, and K. Kim, "A lightweight protocol enabling ownership transfer and granular data access of RFID tags," Proceeding of Symposium on Cryptography and Information Security Sasebo, pp. 23-26, 2007.
-
(2007)
Proceeding of Symposium on Cryptography and Information Security Sasebo
, pp. 23-26
-
-
Seo, Y.1
Asano, T.2
Lee, H.3
Kim, K.4
-
14
-
-
49049099167
-
An advanced mutualauthentication algorithm using AES for RFID systems
-
B. Toiruul and K. Lee, "An advanced mutualauthentication algorithm using AES for RFID systems," International Journal of Computer Science and Network Security (IJCSNS), vol. 6, no. 9, pp. 156-162, 2006.
-
(2006)
International Journal of Computer Science and Network Security (IJCSNS)
, vol.6
, Issue.9
, pp. 156-162
-
-
Toiruul, B.1
Lee, K.2
-
15
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," Proceedings of 1st Interna-tional Conference on Security in Pervasive Comput-ing (SPC), pp. 12-14, 2003.
-
(2003)
Proceedings of 1st International Conference on Security in Pervasive Computing (SPC)
, pp. 12-14
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
16
-
-
77958017166
-
Security requirements for RFID computing systems
-
Mar
-
X. Zhang, and B. King, "Security requirements for RFID computing systems," International Journal of Network Security, vol. 6, no. 2, pp. 214V226, Mar. 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.2
, pp. 214-226
-
-
Zhang, X.1
King, B.2
|