-
1
-
-
77955516185
-
Keyed Hash Functions
-
Cryptography: Policy and Algorithms
-
Bakhtiari, S., Safavi-Naini, R. and Pieprzyk, J. (1996) Keyed hash functions', Lecture Notes in Computer Science, Vol. 1029, pp.201-214. (Pubitemid 126030174)
-
(1996)
Lecture Notes in Computer Science
, Issue.1029
, pp. 201-214
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
2
-
-
77949553535
-
Cryptanalysis of two RFID authentication protocols
-
Cao, T. and Shen, P. (2009) Cryptanalysis of two RFID authentication protocols', International Journal of Network Security, Vol. 9, pp.95-100.
-
(2009)
International Journal of Network Security
, vol.9
, pp. 95-100
-
-
Cao, T.1
Shen, P.2
-
3
-
-
79953072900
-
RFID ownership transfer authorization systems conforming epcglobal class-1 generation-2 standards
-
Chen, C.L., Lai, Y.L., Chen, C.C., Deng, Y.Y. and Hwang, Y.C. (2011) RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards', International Journal of Network Security, Vol. 13, No. 1, pp.41-48.
-
(2011)
International Journal of Network Security
, vol.13
, Issue.1
, pp. 41-48
-
-
Chen, C.L.1
Lai, Y.L.2
Chen, C.C.3
Deng, Y.Y.4
Hwang, Y.C.5
-
4
-
-
37849043107
-
'RFID in retail: A framework for examining consumers' ethical perceptions
-
Chen, J.V. and Pfleuger Jr., P.P. (2008) RFID in retail: a framework for examining consumers' ethical perceptions', International Journal of Mobile Communications, Vol. 6, No. 1,pp.53-66.
-
(2008)
International Journal of Mobile Communications
, vol.6
, Issue.1
, pp. 53-66
-
-
Chen, J.V.1
Pfleuger Jr., P.P.2
-
5
-
-
46749130059
-
A novel mutual authentication scheme based on quadratic residues for RFID systems
-
Chen, Y., Chou, J.S. and Sun, H.M. (2008) A novel mutual authentication scheme based on quadratic residues for RFID systems', Computer Networks, Vol. 52, No. 12, pp.2373-2380.
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2373-2380
-
-
Chen, Y.1
Chou, J.S.2
Sun, H.M.3
-
6
-
-
38149009007
-
The state of RFID for eRective baggage tracking in the airline industry
-
DeVries, P.D. (2008) The state of RFID for eRective baggage tracking in the airline industry', International Journal of Mobile Communications, Vol. 6, No. 2, pp.151-164.
-
(2008)
International Journal of Mobile Communications
, vol.6
, Issue.2
, pp. 151-164
-
-
DeVries, P.D.1
-
7
-
-
38149049144
-
Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
-
Han, S., Potdar, V. and Chang, E. (2007) Mutual authentication protocol for RFID tags based on synchronized secret information with monitor', Lecture Notes in Computer Science, Vol. 4707, pp.227-238.
-
(2007)
Lecture Notes in Computer Science
, vol.4707
, pp. 227-238
-
-
Han, S.1
Potdar, V.2
Chang, E.3
-
8
-
-
33646261491
-
Authenticated encryption schemes: Current status and key issues
-
Hwang, M.S. and Liu, C.Y. (2005) Authenticated encryption schemes: current status and key issues', International Journal of Network Security, Vol. 1, pp.61-73.
-
(2005)
International Journal of Network Security
, vol.1
, pp. 61-73
-
-
Hwang, M.S.1
Liu, C.Y.2
-
9
-
-
77954461528
-
PA new Knapsack public-key cryptosystem based on permutation combination algorithm
-
Hwang, M.S., Lee, C.C. and Tzeng, S.F. (2009a) PA new Knapsack public-key cryptosystem based on permutation combination algorithm', International Journal of Applied Mathematics and Computer Sciences, Vol. 5, No. 1, pp.33-38.
-
(2009)
International Journal of Applied Mathematics and Computer Sciences
, vol.5
, Issue.1
, pp. 33-38
-
-
Hwang, M.S.1
Lee, C.C.2
Tzeng, S.F.3
-
10
-
-
79953096361
-
Privacy and security requirements for RFID applications
-
Hwang, M.S., Wei, C.H. and Lee, C.Y. (2009b) Privacy and security requirements for RFID applications', Journal of Computers, Vol. 20, No. 3, pp.55-60.
-
(2009)
Journal of Computers
, vol.20
, Issue.3
, pp. 55-60
-
-
Hwang, M.S.1
Wei, C.H.2
Lee, C.Y.3
-
11
-
-
71649104505
-
DoS-resistant ID-based password authentication scheme using smart cards
-
Hwang, M.S., Chong, S.K. and Chen, T.Y. (2005) DoS-resistant ID-based password authentication scheme using smart cards', Journal of Systems and Software, Vol. 83, pp.163-172.
-
(2005)
Journal of Systems and Software
, vol.83
, pp. 163-172
-
-
Hwang, M.S.1
Chong, S.K.2
Chen, T.Y.3
-
12
-
-
64149092115
-
Robust and efficient authenticated key agreement in mobile communications
-
Juang, W.S. and Wu, J.L. (2009) Robust and efficient authenticated key agreement in mobile communications', International Journal of Mobile Communications, Vol. 7, No. 5, pp.562-579.
-
(2009)
International Journal of Mobile Communications
, vol.7
, Issue.5
, pp. 562-579
-
-
Juang, W.S.1
Wu, J.L.2
-
13
-
-
72449181354
-
Defining strong privacy for RFID
-
Juels, A. and Weis, S.A. (2009) Defining strong privacy for RFID', ACM Transactions on Information and System Security, Vol. 12, No. 1, pp.7:1-7:23.
-
(2009)
ACM Transactions on Information and System Security
, vol.12
, Issue.1
, pp. 71-723
-
-
Juels, A.1
Weis, S.A.2
-
14
-
-
76449091075
-
Enhanced monitoring of tuberculosis patients by using RFID technologies
-
Lai, C.L., Fang, K. and Chien, S.W. (2010) Enhanced monitoring of tuberculosis patients by using RFID technologies', International Journal of Mobile Communications, Vol. 8, No. 2, pp.244-256.
-
(2010)
International Journal of Mobile Communications
, vol.8
, Issue.2
, pp. 244-256
-
-
Lai, C.L.1
Fang, K.2
Chien, S.W.3
-
15
-
-
33847741124
-
The history of RFID
-
DOI 10.1109/MP.2005.1549751
-
Landt, J. (2005) The history of RFID', IEEE Potentials, Vol. 24, No. 4, pp.8-11. (Pubitemid 46504862)
-
(2005)
IEEE Potentials
, vol.24
, Issue.4
, pp. 8-11
-
-
Landt, J.1
-
16
-
-
24944582157
-
Efficient authentication for low-cost RFID systems
-
Computational Science and Its Applications - ICCSA 2005: International Conference, Proceeedings
-
Lee, S.M., Hwang, Y.J., Lee, D.H. and Lim, J.I. (2005) Efficient authentication for low-cost RFID systems', Lecture Notes in Computer Science, Vol. 3480, pp.619-627. (Pubitemid 41313878)
-
(2005)
Lecture Notes in Computer Science
, vol.3480
, Issue.1
, pp. 619-627
-
-
Lee, S.M.1
Hwang, Y.J.2
Lee, D.H.3
Lim, J.I.4
-
17
-
-
79953125329
-
An online RFID laboratory learning environment
-
Lehlou, N. (2009) An online RFID laboratory learning environment', IEEE Transactions on Learning Technologies, Vol. 2, pp.295-303.
-
(2009)
IEEE Transactions on Learning Technologies
, vol.2
, pp. 295-303
-
-
Lehlou, N.1
-
18
-
-
84977783611
-
Strong and robust RFID authentication enabling perfect ownership transfer
-
Lim, C.H. and Takeyoung, K. (2006) Strong and robust RFID authentication enabling perfect ownership transfer', Lecture Notes in Computer Science, Vol. 4307, pp.1-20.
-
(2006)
Lecture Notes in Computer Science
, vol.4307
, pp. 1-20
-
-
Lim, C.H.1
Takeyoung, K.2
-
19
-
-
41549156956
-
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
-
DOI 10.1007/978-3-540-79104-1-20, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings
-
Lim, J., Oh, H. and Kim, S. (2008) A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection', Lecture Notes in Computer Science, Vol. 4991, pp.278-289. (Pubitemid 351465332)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4991
, pp. 278-289
-
-
Lim, J.1
Oh, H.2
Kim, S.3
-
20
-
-
77953018435
-
Nonidentifiable RFID privacy protection with ownership transfer
-
Lin, I.C., Yang, C.W. and Tsaur, S.C. (2010) Nonidentifiable RFID privacy protection with ownership transfer', International Journal of Innovative Computing, Information and Control, Vol. 6, No. 5, pp.2341-2351.
-
(2010)
International Journal of Innovative Computing, Information and Control
, vol.6
, Issue.5
, pp. 2341-2351
-
-
Lin, I.C.1
Yang, C.W.2
Tsaur, S.C.3
-
21
-
-
0004192381
-
-
CRC Press, Canada
-
Menezes, A.J., Oorschot, P.C.V. and Vanstone, S.A. (1996) Handbook of Applied Cryptography, Chapter 9 Hash Functions and Data Integrity, CRC Press, Canada.
-
(1996)
Handbook of Applied Cryptography, Chapter 9 Hash Functions and Data Integrity
-
-
Menezes, A.J.1
Oorschot, P.C.V.2
Vanstone, S.A.3
-
22
-
-
67650870141
-
TK-AKA: Using temporary key on authentication and key agreement protocol on UMTS
-
Ou, H.H., Lin, I.C., Hwang, M.S. and Jan, J.K. (2009) TK-AKA: Using temporary key on authentication and key agreement protocol on UMTS', International Journal of Network Management, Vol. 19, pp.291-303.
-
(2009)
International Journal of Network Management
, vol.19
, pp. 291-303
-
-
Ou, H.H.1
Lin, I.C.2
Hwang, M.S.3
Jan, J.K.4
-
25
-
-
65649112157
-
Security analysis of the song-mitchell authentication protocol for low-cost RFID tags
-
Rizomiliotis, P., Rekleitis, E. and Gritzalis, S. (2009) Security analysis of the song-mitchell authentication protocol for low-cost RFID tags', IEEE Communications Letters, Vol. 13, No. 4, pp.274-276.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.4
, pp. 274-276
-
-
Rizomiliotis, P.1
Rekleitis, E.2
Gritzalis, S.3
-
26
-
-
32444435813
-
Radio frequency identification (RFID)
-
DOI 10.1016/j.cose.2005.12.003, PII S016740480500204X
-
Roberts, C.M. (2006) Radio frequency identification (RFID)', Computers & Security, Vol. 25, No. 1, pp.18-26. (Pubitemid 43227228)
-
(2006)
Computers and Security
, vol.25
, Issue.1
, pp. 18-26
-
-
Roberts, C.M.1
-
27
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
Alexandria, VA, USA
-
Song, B. and Mitchell, C.J. (2008) RFID authentication protocol for low-cost tags', Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, USA, pp.140-147.
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
28
-
-
78751649779
-
Improvement of the RFID authentication scheme based on quadratic residues
-
Yeh, T.C., Wu, C.H. and Tseng, Y.M. (2010) Improvement of the RFID authentication scheme based on quadratic residues', Computer Communications, Vol. 34, No. 3, pp.337-341.
-
(2010)
Computer Communications
, vol.34
, Issue.3
, pp. 337-341
-
-
Yeh, T.C.1
Wu, C.H.2
Tseng, Y.M.3
-
29
-
-
70349582554
-
Protecting your privacy with a mobile agent device in RFID environment
-
Yeo, S.S., Kim, S.C. and Kim, S.K. (2009) Protecting your privacy with a mobile agent device in RFID environment', Wireless Personal Communications, Vol. 51, No. 1, pp.165-178.
-
(2009)
Wireless Personal Communications
, vol.51
, Issue.1
, pp. 165-178
-
-
Yeo, S.S.1
Kim, S.C.2
Kim, S.K.3
|