-
1
-
-
77949553535
-
Cryptanalysis of two RFID authentication protocols
-
Cao, T. and Shen, P. (2009) 'Cryptanalysis of two RFID authentication protocols', International Journal of Network Security, Vol. 9, No. 1, pp.95-100.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.1
, pp. 95-100
-
-
Cao, T.1
Shen, P.2
-
2
-
-
34250667545
-
Architecture design and performance evaluation of RFID object tracking systems
-
Chen, J-L., Chen, M-C., Chen, C-W. and Chang, Y-C. (2007) 'Architecture design and performance evaluation of RFID object tracking systems', Computer Communications, Vol. 30, No. 9, pp.2070-2086.
-
(2007)
Computer Communications
, vol.30
, Issue.9
, pp. 2070-2086
-
-
Chen, J.-L.1
Chen, M.-C.2
Chen, C.-W.3
Chang, Y.-C.4
-
3
-
-
37849043107
-
Rfid in retail: A framework for examining consumers' ethical perceptions
-
Chen, J.C. and Pfleuger Jr., P. (2008) 'Rfid in retail: a framework for examining consumers' ethical perceptions', International Journal of Mobile Communications, Vol. 6, No. 1, pp.53-66.
-
(2008)
International Journal of Mobile Communications
, vol.6
, Issue.1
, pp. 53-66
-
-
Chen, J.C.1
Pfleuger Jr., P.2
-
4
-
-
38149009007
-
The state of rfid for effective baggage tracking in the airline industry
-
DeVries, P.D. (2008) 'The state of rfid for effective baggage tracking in the airline industry', International Journal of Mobile Communications, Vol. 6, No. 2, pp.151-164.
-
(2008)
International Journal of Mobile Communications
, vol.6
, Issue.2
, pp. 151-164
-
-
DeVries, P.D.1
-
5
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
Garfinkel, S.L., Juels, A. and Pappu, R. (2005) 'RFID privacy: an overview of problems and proposed solutions', IEEE Security & Privacy, Vol. 3, No. 3, pp.34-43.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
6
-
-
77952154117
-
Understanding the key success factors of rfid use in supply chain management: A delphi study
-
Hung, S-Y., Chang, S-I. and Ting, C-P. (2010) 'Understanding the key success factors of rfid use in supply chain management: a delphi study', International Journal of Mobile Communications, Vol. 8, No. 3, pp.313-333.
-
(2010)
International Journal of Mobile Communications
, vol.8
, Issue.3
, pp. 313-333
-
-
Hung, S.-Y.1
Chang, S.-I.2
Ting, C.-P.3
-
7
-
-
79953096361
-
Privacy and security requirements for RFID applications
-
Hwang, M-S. Wei, C-H. and Lee, C-Y. (2009) 'Privacy and security requirements for RFID applications', Journal of Computers, Vol. 20, No. 3.
-
(2009)
Journal of Computers
, vol.20
, Issue.3
-
-
Hwang, M.-S.1
Wei, C.-H.2
Lee, C.-Y.3
-
8
-
-
64149092115
-
Robust and efficient authenticated key agreement in mobile communications
-
Juang, W-S. and Wu, J-L. (2009) 'Robust and efficient authenticated key agreement in mobile communications', International Journal of Mobile Communications, Vol. 7, No. 5, pp.562-579.
-
(2009)
International Journal of Mobile Communications
, vol.7
, Issue.5
, pp. 562-579
-
-
Juang, W.-S.1
Wu, J.-L.2
-
9
-
-
33144457479
-
RFID security and privacy: A research survey
-
Juels, A. (2006) 'RFID security and privacy: a research survey', IEEE Journal on Selected Areas in Communication, Vol. 24, No. 2, pp.381-394.
-
(2006)
IEEE Journal on Selected Areas in Communication
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
11
-
-
33745803207
-
MARP: Mobile agent for RFID privacy protection
-
Kim, S-C., Yeo, S-S. and Kim, S.K. (2006) 'MARP: mobile agent for RFID privacy protection', Lecture Notes in Computer Science, Vol. 3928, pp.300-312.
-
(2006)
Lecture Notes in Computer Science
, vol.3928
, pp. 300-312
-
-
Kim, S.-C.1
Yeo, S.-S.2
Kim, S.K.3
-
12
-
-
76449091075
-
Enhanced monitoring of tuberculosis patients by using RFID technologies
-
Lai, C-L. Fang, K. and Chien, S-W. (2010) 'Enhanced monitoring of tuberculosis patients by using RFID technologies', International Journal of Mobile Communications, Vol. 8, No. 2, pp.244-256.
-
(2010)
International Journal of Mobile Communications
, vol.8
, Issue.2
, pp. 244-256
-
-
Lai, C.-L.1
Fang, K.2
Chien, S.-W.3
-
13
-
-
32844473946
-
The evolution of RFID security
-
Rieback, M.R., Crispo, B. and Tanenbaum, A.S. (2006) 'The evolution of RFID security', IEEE Pervasive Computing, Vol. 5, No. 1, pp.62-69.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.1
, pp. 62-69
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
14
-
-
65649112157
-
Security analysis of the song-mitchell authentication protocol for low-cost RFID tags
-
Rizomiliotis, P., Rekleitis, E. and Gritzalis, S. (2009) 'Security analysis of the song-Mitchell authentication protocol for low-cost RFID tags', IEEE Communications Letters, Vol. 13, No. 4, pp.274-276.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.4
, pp. 274-276
-
-
Rizomiliotis, P.1
Rekleitis, E.2
Gritzalis, S.3
-
15
-
-
32444435813
-
Radio frequency identification (RFID)
-
Roberts, C.M. (2006) 'Radio frequency identification (RFID)', Computers & Security, Vol. 25, No. 1, pp.18-26.
-
(2006)
Computers & Security
, vol.25
, Issue.1
, pp. 18-26
-
-
Roberts, C.M.1
-
16
-
-
42549157259
-
A framework for assessing RFID system security and privacy risks
-
Rotter, P. (2008) 'A framework for assessing RFID system security and privacy risks', IEEE Pervasive Computing, Vol. 7, No. 2, pp.70-77.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.2
, pp. 70-77
-
-
Rotter, P.1
-
17
-
-
65249139852
-
Critical RFID privacy-ehancing
-
Spiekermann, S. and Evdokimov, S. (2009) 'Critical RFID privacy-ehancing', IEEE Security & Privacy, Vol. 7, No. 2, pp.56-62.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.2
, pp. 56-62
-
-
Spiekermann, S.1
Evdokimov, S.2
-
18
-
-
85008055668
-
Secure and serverless RFID authentication and search protocols
-
Tan, C.C., Sheng, B. and Li, Q. (2008) 'Secure and serverless RFID authentication and search protocols', IEEE Transactions on Wireless Communications, Vol. 7, No. 4, pp.1400-1407.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.4
, pp. 1400-1407
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
19
-
-
79956297141
-
An authentication protocol for low-cost RFID tags
-
Wei, C-H., Hwang, M-S. and Chin, A.Y-H. (2011) 'An authentication protocol for low-cost RFID tags', International Journal of Mobile Communications, Vol. 9, No. 2, pp.208-223.
-
(2011)
International Journal of Mobile Communications
, vol.9
, Issue.2
, pp. 208-223
-
-
Wei, C.-H.1
Hwang, M.-S.2
Chin, A.Y.-H.3
-
20
-
-
70349582554
-
Protecting your privacy with a mobile agent device in RFID environment
-
Yeo, S-S., Kim, S-C. and Kim, S.K. (2009) 'Protecting your privacy with a mobile agent device in RFID environment', Wireless Personal Communications, Vol. 51, No. 1, pp.165-178.
-
(2009)
Wireless Personal Communications
, vol.51
, Issue.1
, pp. 165-178
-
-
Yeo, S.-S.1
Kim, S.-C.2
Kim, S.K.3
-
21
-
-
77958017166
-
Security requirements for RFID computing systems
-
Zhang, X. and King, B. (2008) 'Security requirements for RFID computing systems', International Journal of Network Security, Vol. 6, No. 2, pp.214-226.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.2
, pp. 214-226
-
-
Zhang, X.1
King, B.2
|