-
1
-
-
58049152104
-
ERAP: ECC based RFID authentication protocol
-
S. I. Ahamed, F. Rahman, and E. Hoque, "ERAP: ECC based RFID authentication protocol," 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, pp. 219-225, 2008.
-
(2008)
12th IEEE International Workshop on Future Trends of Distributed Computing Systems
, pp. 219-225
-
-
Ahamed, S.I.1
Rahman, F.2
Hoque, E.3
-
2
-
-
77949553535
-
Cryptanalysis of two RFID authentication protocols
-
T. Cao and P. Shen, "Cryptanalysis of two RFID authentication protocols," International Journal of Network Security, vol. 9, no. 1, pp. 95-100, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.1
, pp. 95-100
-
-
Cao, T.1
Shen, P.2
-
3
-
-
79953072900
-
RFID ownership transfer authorization systems conforming epcglobal class-1 generation-2 standards
-
C. L. Chen, Y. L. Lai, C. C. Chen, Y. Y. Deng, and Y. C. Hwang, "RFID ownership transfer authorization systems conforming epcglobal class-1 generation-2 standards," International Journal of Network Security, vol. 13, no. 1, pp. 41-48, 2011.
-
(2011)
International Journal of Network Security
, vol.13
, Issue.1
, pp. 41-48
-
-
Chen, C.L.1
Lai, Y.L.2
Chen, C.C.3
Deng, Y.Y.4
Hwang, Y.C.5
-
4
-
-
58149199450
-
RFID-based real-time smart waste management system
-
Australasian, Dec. 2-5
-
B. Chowdhury and M. U. Chowdhury, "RFID-based real-time smart waste management system," Telecommunication Networks and Applications Conference, pp. 175-180, Australasian, Dec. 2-5, 2007
-
(2007)
Telecommunication Networks and Applications Conference
, pp. 175-180
-
-
Chowdhury, B.1
Chowdhury, M.U.2
-
5
-
-
61849134719
-
Hospital automation system RFID-based: Technology embedded in smart devices (cards, tags and bracelets)
-
Aug. 1455-1458
-
G. H. P. Florentino, C. A. P. de Araujo, H. U. Bezerra, H. B. de A. Junior, M. A. Xavier, V. S. V. de Souza, R. A. de M. Valentim, A. H. F. Morais, A. M. G. Guerreiro, and G. B. Brandao, "Hospital automation system RFID-based: Technology embedded in smart devices (cards, tags and bracelets)," 30th Annual International IEEE EMBS Conference, pp. 1455-1458, pp. 20-25, Aug. 2008.
-
(2008)
30th Annual International IEEE EMBS Conference
, pp. 20-25
-
-
Florentino, G.H.P.1
de Araujo, C.A.P.2
Bezerra, H.U.3
Junior, H.B.A.4
Xavier, M.A.5
de Souza, V.S.V.6
Valentim, R.A.M.7
Morais, A.H.F.8
Guerreiro, A.M.G.9
Brandao, G.B.10
-
6
-
-
52249097679
-
Digital codec design for RFID tag based on cryptographic authentication protocol
-
J. Jeo, S. Ryu, T. M. Chang, H. Y. Choi, and M. S. Kang, "Digital codec design for RFID tag based on cryptographic authentication protocol," Future Generation Communication and Networking, pp. 119-124, 2007.
-
(2007)
Future Generation Communication and Networking
, pp. 119-124
-
-
Jeo, J.1
Ryu, S.2
Chang, T.M.3
Choi, H.Y.4
Kang, M.S.5
-
7
-
-
74549155847
-
RFID-based information sharing platform
-
Oct. 1-4
-
N. Li, Z. L. Deng, F. Wan, S. Zhu, and X. Liu, "RFID-based information sharing platform," IEEE International Conference on Communications Technology and Applications, pp. 1-4, pp. 16-18, Oct. 2009.
-
(2009)
IEEE International Conference on Communications Technology and Applications
, pp. 16-18
-
-
Li, N.1
Deng, Z.L.2
Wan, F.3
Zhu, S.4
Liu, X.5
-
8
-
-
84858209810
-
-
Manchester Code, Wikipedia, The Free Encyclopedia
-
Manchester Code, Wikipedia, The Free Encyclopedia. (http://en.wikipedia.org/wiki/Manchestercode)
-
-
-
-
10
-
-
84858268805
-
-
Cornell University Electrical Engineering Final Projects
-
C. Ross and R. Goto, Proximity Security System, Cornell University Electrical Engineering Final Projects, 2006.
-
(2006)
Proximity Security System
-
-
Ross, C.1
Goto, R.2
-
11
-
-
67649484364
-
A gen2-based RFID authentication protocol for security and privacy
-
Aug
-
H. M. Sun and W. C. Ting, "A gen2-based RFID authentication protocol for security and privacy," IEEE Transactions on Mobile Computing, vol. 8, no. 8, pp. 1052-1062, Aug. 2009.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.8
, pp. 1052-1062
-
-
Sun, H.M.1
Ting, W.C.2
-
12
-
-
77951761478
-
RFID-based authentication middleware for mobile devices
-
E. Syta, S. Kurkovsky, and B. Casano, "RFID-based authentication middleware for mobile devices," Hawaii International Conference on System Sciences, pp. 1-10, 2010.
-
(2010)
Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Syta, E.1
Kurkovsky, S.2
Casano, B.3
-
13
-
-
77952748887
-
A hash-based authentication protocol for secure mobile RFID systems
-
K. Wu, E. Bai, and W. Zhang, "A hash-based authentication protocol for secure mobile RFID systems," First International Conference on Information Science and Engineering, pp. 2440-2443, 2009.
-
(2009)
First International Conference on Information Science and Engineering
, pp. 2440-2443
-
-
Wu, K.1
Bai, E.2
Zhang, W.3
-
14
-
-
77958017166
-
Security requirements for RFID computing systems
-
X. Zhang and B. King, "Security requirements for RFID computing systems," International Journal of Network Security, vol. 6, no. 2, pp. 214-226, 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.2
, pp. 214-226
-
-
Zhang, X.1
King, B.2
|