-
1
-
-
33144457479
-
RFID security and privacy: A research survey [J]
-
JUELS A. RFID Security and Privacy: A Research Survey [J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2) 381-394.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
2
-
-
56749103027
-
RFID authentication protocol for low-cost tags [C]
-
Alexandria, Virginia, USA. New York, NY, USA: ACM Press, 2008
-
SONG B, MITCHELL CJ. RFID Authentication Protocol for Low-cost Tags [C]// Proceedings of the first ACM Conference on Wireless Network Security: March 31-April 2, 2008, Alexandria, Virginia, USA. NewYork, NY, USA: ACM Press, 2008: 140-147.
-
(2008)
Proceedings of the first ACM Conference on Wireless Network Security: March 31-April 2
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
4
-
-
58149094596
-
Security of an RFID protocol for supply chains [C]
-
Xi'an, Shaanxi Province, China. IEEE Computer Society, 2008
-
VANDEURSEN T, RADOMIROVÍCS. Security of an RFID Protocol for Supply Chains [C]// Proceedings of the 2008 IEEE International Conference on e-Business Engineering: October 22-24, 2008, Xi'an, Shaanxi Province, China. IEEE Computer Society, 2008: 568-573.
-
(2008)
Proceedings of the 2008 IEEE International Conference on e-Business Engineering: October 22-24
, pp. 568-573
-
-
Van Deursen, T.1
Radomirovíc, S.2
-
5
-
-
44649113207
-
Untraceability of RFID protocols [C]
-
Seville, Spain. Lecture Notes in Computer Science, 2008
-
VAN DEURSEN T, MAUW S, RADOMIROVÍC S. Untraceability of RFID Protocols [C]// Proceedings of the Second IFTP WG 112 International Workshop on Information Security Theory and Practice: May 13-16, 2008, Seville, Spain. Lecture Notes in Computer Science, 2008, 5019: 1-15.
-
(2008)
Proceedings of the Second IFTP WG 112 International Workshop on Information Security Theory and Practice: May 13-16
, vol.5019
, pp. 1-15
-
-
Van Deursen, T.1
Mauw, S.2
Radomirovíc, S.3
-
6
-
-
70350399643
-
Secure ownership and ownership transfer in RFID systems [C]
-
Saint-Malo, France. Lecture Notes in Computer Science, 2009
-
th European Symposium On Research In Computer Security: September 21-23, 2009, Saint-Malo, France. Lecture Notes in Computer Science, 2009, 5789: 637-654.
-
(2009)
th European Symposium On Research In Computer Security: September 21-23
, vol.5789
, pp. 637-654
-
-
Van Deursen, T.1
Mauw, S.2
Radomirovíc, S.3
-
9
-
-
57049184162
-
RFID privacy models revisited [C]
-
Malaga, Spain. Lecture Notes in Computer Science, 2008
-
th European Symposium on Research in Computer Security: October 6-8, 2008, Malaga, Spain. Lecture Notes in Computer Science, 2008, 5283: 251-266.
-
(2008)
th European Symposium on Research in Computer Security: October 6-8
, vol.5283
, pp. 251-266
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
-
13
-
-
54049143316
-
Elliptic-curve-based security processor for RFID [J]
-
LEE YK, SAKIYAMA K, BATINA L, et al. Elliptic-Curve-Based Security Processor for RFID [J]. IEEE Transactions on Computers, 2008, 57: 1514-1527.
-
(2008)
IEEE Transactions on Computers
, vol.57
, pp. 1514-1527
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
-
15
-
-
49049105964
-
ECRAC(EC-DLP based randomized access control): Provably secure RFID authentication protocol [C]
-
Las Vegas, NV, USA. Piscataway, NJ, USA: IEEE Press, 2008
-
LEE YK, BATINA L, VERBAUWHEDE I. ECRAC(EC-DLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol [C]// Proceedings of the 2008 IEEE International Conference on RFID: April 16-17, 2008, Las Vegas, NV, USA. Piscataway, NJ, USA: IEEE Press, 2008: 97-104.
-
(2008)
Proceedings of the 2008 IEEE International Conference on RFID: April 16-17
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
16
-
-
58449108568
-
Cryptanalysis of EC-RAC, A RFID identification protocol [C]
-
Hong Kong, China. Lecture Notes in Computer Science, 2008
-
th International Conference on Cryptology and Network Security: December 2-4, 2008, Hong Kong, China. Lecture Notes in Computer Science, 2008, 5339: 149-161.
-
(2008)
th International Conference on Cryptology and Network Security: December 2-4
, vol.5339
, pp. 149-161
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
17
-
-
70349268101
-
Untraceable RFID authentication protocols: Revision of EC-RAC [C]
-
Orlando, Florida, USA. IEEE Computer Society, 2009
-
LEE YK, BATINA L, VERBAUWHEDE I. Untraceable RFID Authentication Protocols: Revision of EC-RAC [C]// Proceedings of the 2009 IEEE International Conference on RFID: April 27-28, 2009, Orlando, Florida, USA. IEEE Computer Society, 2009: 178-185.
-
(2009)
Proceedings of the 2009 IEEE International Conference on RFID: April 27-28
, pp. 178-185
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
19
-
-
65249186388
-
A secure elliptic curve-based RFID protocol [J]
-
MARTÍNEZ S, VALLS M, ROIG C, et al. A Secure Elliptic Curve-based RFID Protocol [J]. Journal of Computer Science and Technology, 2009, 24: 309-318.
-
(2009)
Journal of Computer Science and Technology
, vol.24
, pp. 309-318
-
-
Martínez, S.1
Valls, M.2
Roig, C.3
-
21
-
-
74049109627
-
An efficient forward private RFID protocol [C]
-
Chicago, IL, USA. New York, NY, USA: ACM Press, 2009
-
th ACM Conference on Computer and Communications Security: November 9-13, 2009, Chicago, IL, USA. New York, NY, USA: ACM Press, 2009: 43-53.
-
(2009)
th ACM Conference on Computer and Communications Security: November 9-13
, pp. 43-53
-
-
Berbain, C.1
Billet, O.2
Etrog, J.3
-
23
-
-
34547687590
-
Defining strong privacy for RFID [C]
-
White Plains, NY, USA. Piscataway, NJ, USA: IEEE Press, 2007
-
JUELS A, WEIS A. Defining Strong Privacy for RFID [C].Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops: March 19-23, 2007, White Plains, NY, USA. Piscataway, NJ, USA: IEEE Press, 2007: 342-347.
-
(2007)
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops: March 19-23
, pp. 342-347
-
-
Juels, A.1
Weis, A.2
-
24
-
-
70349118926
-
Mutual authentication in RFID: Security and privacy [C]
-
Tokyo, Japan. New York, NY, USA: ACM Press, 2008
-
PAISE R-I, VAUDENA YS. Mutual Authentication in RFID: Security and Privacy [C]// Proceedings of the 2008 ACM Symposium on Information. Computer and Communication Security: March 19-20, 2008, Tokyo, Japan. New York, NY, USA: ACM Press, 2008: 292-299.
-
(2008)
Proceedings of the 2008 ACM Symposium on Information. Computer and Communication Security: March 19-20
, pp. 292-299
-
-
Paise, R.-I.1
Vaudena, Y.S.2
-
26
-
-
84885893141
-
Wide-weak privacy-preserving RFID authentication protocols [C]
-
Barcelona,Spain.Springer-Verlag, 2010
-
LEE YK, BATINA L, SINGELEÉ, et al. Wide-Weak Privacy-Preserving RFID Authentication Protocols [C]// Proceedings of the 2010 International Conference on Mobile Lightweight Wireless Systems: May, 2010, Barcelona, Spain. Springer-Verlag, 2010: 254-267.
-
(2010)
Proceedings of the 2010 International Conference on Mobile Lightweight Wireless Systems: May
, pp. 254-267
-
-
Lee, Y.K.1
Batina, L.2
Singele, É.3
|