-
1
-
-
79551705940
-
Counterfeit goods and their potential financing of international terrorism
-
Z. A. Pollinger. "Counterfeit goods and their potential financing of international terrorism." In Michigan Journal of Business Vol. 1, No. 1. 2008. pp. 85-102.
-
(2008)
Michigan Journal of Business
, vol.1
, Issue.1
, pp. 85-102
-
-
Pollinger, Z.A.1
-
4
-
-
33750353849
-
A secure and efficient rfid protocol that could make big brother (partially) obsolete
-
T. Dimitriou. "A secure and efficient rfid protocol that could make big brother (partially) obsolete". In Proc. of PerCom 06. pp.269-275.
-
Proc. of PerCom 06
, pp. 269-275
-
-
Dimitriou, T.1
-
5
-
-
34547617482
-
Dynamic key updating privacy-preserving authentication for RFID systems
-
L. Lu, J. Han, L. Hu, Y. Lin, and L. M. Ni. "Dynamic key updating privacy-preserving authentication for RFID systems". In Proc. of PerCom 07. 2007. pp. 13-22.
-
Proc. of PerCom 07. 2007
, pp. 13-22
-
-
Lu, L.1
Han, J.2
Hu, L.3
Lin, Y.4
Ni, L.M.5
-
6
-
-
79957965485
-
AnonPri: An efficient anonymous private authentication protocol
-
M. E. Hoque, F. Rahman, and S. I. Ahamed, "AnonPri: An efficient anonymous private authentication protocol", In Proc. of PerCom 11, 2011. pp. 102-110.
-
Proc. of PerCom 11, 2011
, pp. 102-110
-
-
Hoque, M.E.1
Rahman, F.2
Ahamed, S.I.3
-
8
-
-
70349666896
-
ACTION: Breaking the privacy barrier for RFID systems
-
L. Lu, J. Han, R. Xiao, and Y. Lin. "ACTION: breaking the privacy barrier for RFID systems". In Proc.of INFOCOM 09. pp.1953-1961.
-
Proc.of INFOCOM 09
, pp. 1953-1961
-
-
Lu, L.1
Han, J.2
Xiao, R.3
Lin, Y.4
-
9
-
-
84940024494
-
Quantifying information leakage in tree-based hash protocols
-
K. Nohl and D. Evans. "Quantifying information leakage in tree-based hash protocols". In Proc. of ICICS 06. 2006. pp. 228-237.
-
Proc. of ICICS 06. 2006
, pp. 228-237
-
-
Nohl, K.1
Evans, D.2
-
10
-
-
33749512062
-
An enhanced dynamic flamed slotted aloha algorithm for RFID tag identification
-
R. Lee, S. D. Joo, and C. W. Lee. "An enhanced dynamic flamed slotted aloha algorithm for RFID tag identification," In Proc. of MobiQuitous 05, 2005. pp. 166-174.
-
Proc. of MobiQuitous 05, 2005
, pp. 166-174
-
-
Lee, R.1
Joo, S.D.2
Lee, C.W.3
-
11
-
-
78149282448
-
Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments
-
M. E. Hoque, F. Rahman, and S. I. Ahamed, and I. H. Park. "Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments", In Springer Wireless Personal Comm. Vol. 55, Iss. 1, 2009. pp. 65-79.
-
(2009)
Springer Wireless Personal Comm
, vol.55
, Issue.1
, pp. 65-79
-
-
Hoque, M.E.1
Rahman, F.2
Ahamed, S.I.3
Park, I.H.4
-
12
-
-
72949093749
-
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol
-
M. E. Hoque, F. Rahman, and S. I. Ahamed. "Supporting recovery, privacy and security in RFID systems using a robust authentication protocol". In Proc. of SAC 09. 2009, pp. 1062-1066.
-
Proc. of SAC 09. 2009
, pp. 1062-1066
-
-
Hoque, M.E.1
Rahman, F.2
Ahamed, S.I.3
-
13
-
-
84861558728
-
YA-SRAP: Yet another serverless RFID authentication protocol
-
S. I. Ahamed, F. Rahman, M. E. Hoque, F. Kawsar, and T. Nakajima. "YA-SRAP: yet another serverless RFID authentication protocol". In Proc. IE 08. 2008. pp. 1-8.
-
Proc. IE 08. 2008
, pp. 1-8
-
-
Ahamed, S.I.1
Rahman, F.2
Hoque, M.E.3
Kawsar, F.4
Nakajima, T.5
-
15
-
-
67650132302
-
Low cost SHA-1 hash function architecture for RFID tags
-
M. O'Neill. "Low cost SHA-1 hash function architecture for RFID tags". In Proc. of RFIDSec 08, 2008.
-
Proc. of RFIDSec 08, 2008
-
-
O'Neill, M.1
-
18
-
-
33847056674
-
Adaptive binary splitting: A RFID tag collision arbitration protocol for tag identification
-
J. Myung and W. Lee. "Adaptive binary splitting: A RFID tag collision arbitration protocol for tag identification". In Proc. of BroadNets 05. 2005. pp. 347-355.
-
Proc. of BroadNets 05. 2005
, pp. 347-355
-
-
Myung, J.1
Lee, W.2
-
20
-
-
84861534623
-
-
E. Microelectronics. Datasheet
-
E. Microelectronics. Supertag category protocols. Datasheet. http://www.gaw.ru/doc/EM-Marin/P4022.PDF.
-
Supertag Category Protocols
-
-
-
21
-
-
13444287573
-
-
Dept. of Computer Science, The University of Texas at Dallas
-
C. Abraham, V. Ahuja, A. Ghosh, and P. Pakanati. "Inventory management using passive RFID tags: A survey". Dept. of Computer Science, The University of Texas at Dallas. 2002. pp. 1-16
-
(2002)
Inventory Management Using Passive RFID Tags: A Survey
, pp. 1-16
-
-
Abraham, C.1
Ahuja, V.2
Ghosh, A.3
Pakanati, P.4
-
23
-
-
79957668373
-
Identification free batch authentication for RFID tags
-
L. Yang, J. Han, Y. Qi, and Y. Liu. "Identification free batch authentication for RFID tags". In Proc. of ICNP. 2010. pp.154-163.
-
Proc. of ICNP. 2010
, pp. 154-163
-
-
Yang, L.1
Han, J.2
Qi, Y.3
Liu, Y.4
-
25
-
-
58649098157
-
RFID in pervasive computing: State-of-the-art and outlook
-
G. Roussos and V. Kostakos. "RFID in pervasive computing: state-of-the-art and outlook". In Pervasive and Mobile Comp., Vol. 5, Iss. 1. 2008. pp. 110-131.
-
(2008)
Pervasive and Mobile Comp.
, vol.5
, Issue.1
, pp. 110-131
-
-
Roussos, G.1
Kostakos, V.2
-
26
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
D. Molnar, and D. Wagner. "Privacy and security in library RFID: Issues, practices, and architectures". In Proc. of CCS 04. 2004. pp. 210-219.
-
Proc. of CCS 04. 2004
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
|