-
2
-
-
79953072900
-
RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards
-
C.-L. Chen, Y.-L. Lai, C.-C. Chen, Y.-Y. Deng, and Y.-C. Hwang RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards International Journal of Network Security 12 3 May 2011 221 228
-
(2011)
International Journal of Network Security
, vol.12
, Issue.3
, pp. 221-228
-
-
Chen, C.-L.1
Lai, Y.-L.2
Chen, C.-C.3
Deng, Y.-Y.4
Hwang, Y.-C.5
-
3
-
-
80455144141
-
Choo, Boyd, and Hitchcock Examining indistinguishability-based proof models for key establishment protocols
-
Springer-Verlag
-
Choo, Boyd, and Hitchcock Examining indistinguishability-based proof models for key establishment protocols Advances in Cryptology - Asiacrypt05 2005 Springer-Verlag
-
(2005)
Advances in Cryptology - Asiacrypt05
-
-
-
5
-
-
27644472569
-
Gilbert, Robshaw, and Sibert An active attack against HB+ - A provably secure lightweight authentication protocol
-
Gilbert, Robshaw, and Sibert An active attack against HB+ - a provably secure lightweight authentication protocol IEEE Electronic Letters 41 21 2005 1169 1170
-
(2005)
IEEE Electronic Letters
, vol.41
, Issue.21
, pp. 1169-1170
-
-
-
6
-
-
51149098609
-
Improved lightweight mutual authentication protocol for RFID systems Wireless and Mobile Networking
-
G. Godor, and M. Antal Improved lightweight mutual authentication protocol for RFID systems Wireless and Mobile Networking IFIP International Federation for Information Processing Volume 284 2008 71 482
-
(2008)
IFIP International Federation for Information Processing
, vol.284
, pp. 71-482
-
-
Godor, G.1
Antal, M.2
-
14
-
-
77949415170
-
Vulnerabilities in some recently proposed RFID ownership transfer protocols
-
G. Kapoor, and S. Piramuthu Vulnerabilities in some recently proposed RFID ownership transfer protocols IEEE Communications Letters 14 3 March 2010 260 262
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.3
, pp. 260-262
-
-
Kapoor, G.1
Piramuthu, S.2
-
16
-
-
33646831640
-
On the security of the Canetti-Krawczyk model
-
Computational Intelligence and Security - International Conference, CIS 2005, Proceedings
-
Li, Ma, and Moon On the security of the Canetti-Krawczyk Model Proceedings of CIS, Part II, LNAI 3802 2005 Springer-Verlag 356 363 (Pubitemid 43775272)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3802
, pp. 356-363
-
-
Li, X.1
Ma, J.2
Moon, S.3
-
17
-
-
77953018435
-
Non-identifiable RFID privacy protection with ownership transfer
-
I.-C. Lin, C.-W. Yang, and S.-C. Tsaur Non-identifiable RFID privacy protection with ownership transfer International Journal of Innovative Computing, Information, and Control 6 4 April 2010
-
(2010)
International Journal of Innovative Computing, Information, and Control
, vol.6
, Issue.4
-
-
Lin, I.-C.1
Yang, C.-W.2
Tsaur, S.-C.3
-
19
-
-
33947538532
-
Protocols for RFID tag/reader authentication
-
DOI 10.1016/j.dss.2007.01.003, PII S0167923607000103, Integrated Decision Support
-
S. Piramuthu Protocols for RFID tag/reader authentication Decision Support Systems 43 3 2007 897 914 (Pubitemid 46466997)
-
(2007)
Decision Support Systems
, vol.43
, Issue.3
, pp. 897-914
-
-
Piramuthu, S.1
-
20
-
-
78650176848
-
RFID mutual authentication protocols
-
S. Piramuthu RFID mutual authentication protocols Decision Support Systems 50 2 2011 387 393
-
(2011)
Decision Support Systems
, vol.50
, Issue.2
, pp. 387-393
-
-
Piramuthu, S.1
-
23
-
-
80455152758
-
Scalable RFID security protocols supporting tag ownership transfer
-
B. Song, and C.J. Mitchell Scalable RFID security protocols supporting tag ownership transfer Computer Communications 2010
-
(2010)
Computer Communications
-
-
Song, B.1
Mitchell, C.J.2
-
24
-
-
57749119310
-
Identifying RFID-embedded objects in pervasive healthcare applications
-
Y.-J. Tu, W. Zhou, and S. Piramuthu Identifying RFID-embedded objects in pervasive healthcare applications Decision Support Systems 46 2 2009 586 593
-
(2009)
Decision Support Systems
, vol.46
, Issue.2
, pp. 586-593
-
-
Tu, Y.-J.1
Zhou, W.2
Piramuthu, S.3
-
26
-
-
80455152756
-
Mobile RFID security protocol and its GNY logic analysis
-
X.-F. Wang, J.-G. Liu, J. Xu, and S.-L. Liu Mobile RFID security protocol and its GNY logic analysis Journal of Computer Applications 28 9 2009 2239 2241
-
(2009)
Journal of Computer Applications
, vol.28
, Issue.9
, pp. 2239-2241
-
-
Wang, X.-F.1
Liu, J.-G.2
Xu, J.3
Liu, S.-L.4
-
27
-
-
77949864345
-
Lightweight authentication protocol for mobile RFID networks
-
M.-H. Yang Lightweight authentication protocol for mobile RFID networks International Journal of Security and Networks 5 1 2009 53 62
-
(2009)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 53-62
-
-
Yang, M.-H.1
|