-
1
-
-
77953725595
-
Survivable RFID systems: Issues, challenges, and techniques
-
Y. Zuo, "Survivable RFID systems: Issues, challenges, and techniques," IEEE Trans. Syst. Man Cybern. C Appl. Rev., vol. 40, pp. 406-418, 2010.
-
(2010)
IEEE Trans. Syst. Man Cybern. C Appl. Rev.
, vol.40
, pp. 406-418
-
-
Zuo, Y.1
-
2
-
-
77949394613
-
A wireless sensor system for prognostics and health management
-
S. Cheng, K. Tom, L. Thomas, and M. Pecht, "A wireless sensor system for prognostics and health management," IEEE Sensors J., vol. 10, pp. 856-862, 2010.
-
(2010)
IEEE Sensors J.
, vol.10
, pp. 856-862
-
-
Cheng, S.1
Tom, K.2
Thomas, L.3
Pecht, M.4
-
3
-
-
77954775144
-
Code-centric RFID system based on software agent intelligence
-
M. Chen, S. Gonzalez, Q. Zhang, and V. C. M. Leung, "Code-centric RFID system based on software agent intelligence," IEEE Intell. Syst., vol. 25, pp. 12-19, 2010.
-
(2010)
IEEE Intell. Syst.
, vol.25
, pp. 12-19
-
-
Chen, M.1
Gonzalez, S.2
Zhang, Q.3
Leung, V.C.M.4
-
4
-
-
77954597619
-
Feedback based clock synchronization in wireless sensor networks: A control theoretic approach
-
J. Chen, Q. Yu, Y. Zhang, H. Chen, and Y. Sun, "Feedback based clock synchronization in wireless sensor networks: A control theoretic approach," IEEE Trans. Veh. Technol., vol. 59, pp. 2963-2973, 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, pp. 2963-2973
-
-
Chen, J.1
Yu, Q.2
Zhang, Y.3
Chen, H.4
Sun, Y.5
-
5
-
-
77951252131
-
A lightweight authentication protocol for low-cost RFID
-
H. Y. Chien and C. W. Huang, "A lightweight authentication protocol for low-cost RFID," J. Sign. Process. Syst., vol. 59, pp. 95-102, 2010.
-
(2010)
J. Sign. Process. Syst.
, vol.59
, pp. 95-102
-
-
Chien, H.Y.1
Huang, C.W.2
-
6
-
-
36248971663
-
LMAP: A real lightweight mutual authentication protocol low-cost RFID tags
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. E. Tapiador, and A. Ribagorda, "LMAP: A real lightweight mutual authentication protocol low-cost RFID tags," in Proc. 2nd Workshop on RFID Security, 2006, pp. 137-148.
-
(2006)
Proc. 2nd Workshop on RFID Security
, pp. 137-148
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Tapiador, J.M.E.3
Ribagorda, A.4
-
7
-
-
67649484364
-
A Gen2-based RFID authentication protocol for security and privacy
-
H. M. Sun and W. C. Ting, "A Gen2-based RFID authentication protocol for security and privacy," IEEE Trans. Mob. Comput., vol. 8, pp. 1052-1062, 2009.
-
(2009)
IEEE Trans. Mob. Comput.
, vol.8
, pp. 1052-1062
-
-
Sun, H.M.1
Ting, W.C.2
-
8
-
-
77953303552
-
Lightweight mutual authentication and ownership transfer for RFID systems
-
L. Kulseng, Z. Yu, Y.Wei, and Y. Guan, "Lightweight mutual authentication and ownership transfer for RFID systems," in Proc. IEEE INFOCOM, 2010, pp. 1-5.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-5
-
-
Kulseng, L.1
Yu, Z.2
Wei, Y.3
Guan, Y.4
-
9
-
-
78649323940
-
Efficient vehicle ownership identification scheme based on triple-trapdoor Chameleon Hash function
-
D. R. Lin, C. I. Wang, and D. J. Guan, "Efficient vehicle ownership identification scheme based on triple-trapdoor Chameleon Hash function," J. Network Comput. Appl., vol. 34, pp. 12-19, 2011.
-
(2011)
J. Network Comput. Appl.
, vol.34
, pp. 12-19
-
-
Lin, D.R.1
Wang, C.I.2
Guan, D.J.3
-
10
-
-
35048859848
-
Strong authentication for RFID aystems using the AES algorithm
-
LNCS
-
M. Feldhofer, S. Dominikus, and J.Wolkerstorfer, "Strong authentication for RFID aystems using the AES algorithm," in Proc. Cryptogr. Hardw. Embed. Syst., CHES'04, 2004, vol. 3156, LNCS, pp. 357-370.
-
(2004)
Proc. Cryptogr. Hardw. Embed. Syst., CHES'04
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
11
-
-
58049152104
-
ERAP: ECC based RFID authentication protocol
-
S. I. Ahamed, F. Rahman, and E. Hoque, "ERAP: ECC based RFID authentication protocol," in Proc. 12th IEEE Int. Workshop on Future Trends of Distrib. Comput. Syst. (FTDCS'08), 2008, pp. 219-225.
-
(2008)
Proc. 12th IEEE Int. Workshop on Future Trends of Distrib. Comput. Syst. (FTDCS'08)
, pp. 219-225
-
-
Ahamed, S.I.1
Rahman, F.2
Hoque, E.3
-
12
-
-
76649084242
-
Efficient publicly verifiable secret sharing with correctness, soundness and ZK privacy
-
K. Peng and F. Bao, "Efficient publicly verifiable secret sharing with correctness, soundness and ZK privacy," Inf. Secur. Appl., vol. 5932, pp. 118-132, 2009.
-
(2009)
Inf. Secur. Appl.
, vol.5932
, pp. 118-132
-
-
Peng, K.1
Bao, F.2
-
13
-
-
51649110861
-
Pseudo trust: Zero-knowledge authentication in anonymous P2Ps
-
L. Lu, J. Han, Y. Liu, L. Hu, J. Huai, L. M. Ni, and J. Ma, "Pseudo trust: Zero-knowledge authentication in anonymous P2Ps," IEEE Trans. Parallel Distrib. Syst., vol. 19, pp. 1325-1337, 2008.
-
(2008)
IEEE Trans. Parallel Distrib. Syst.
, vol.19
, pp. 1325-1337
-
-
Lu, L.1
Han, J.2
Liu, Y.3
Hu, L.4
Huai, J.5
Ni, L.M.6
Ma, J.7
-
14
-
-
77953719966
-
Multifactor identity verification using aggregated proof of knowledge
-
A. Bhargav-Spantzel, A. C. Squicciarini, R. Xue, and E. Bertino, "Multifactor identity verification using aggregated proof of knowledge," IEEE Trans. Syst. Man Cybern. C Appl. Rev., vol. 40, pp. 372-383, 2010.
-
(2010)
IEEE Trans. Syst. Man Cybern. C Appl. Rev.
, vol.40
, pp. 372-383
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.C.2
Xue, R.3
Bertino, E.4
-
16
-
-
80054690312
-
Fiege-Fiat-Shamir ZKP scheme revisited
-
J. M. Kizza, "Fiege-Fiat-Shamir ZKP scheme revisited," Int. J. Comput. ICT Res., vol. 4, pp. 9-19, 2010.
-
(2010)
Int. J. Comput. ICT Res.
, vol.4
, pp. 9-19
-
-
Kizza, J.M.1
-
17
-
-
71149116146
-
Proofs that yield nothing but their validity or all language in np have zero-knowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson, "Proofs that yield nothing but their validity or all language in np have zero-knowledge proof systems," J. Assoc. Comput. Mach., vol. 38, pp. 691-729, 1991.
-
(1991)
J. Assoc. Comput. Mach.
, vol.38
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer, LNCS
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," in Advances Cryptology: Crypto 86. : Springer, 1987, vol. 263, LNCS, pp. 186-194.
-
(1987)
Advances Cryptology: Crypto 86
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
|