-
1
-
-
33749658430
-
RFID application in hospitals: A case study on a demonstration RFID project in a Taiwan hospital
-
IEEE
-
Wang, S. W., Chen, W. H., Ong, C. S., Liu, L., and Chuang, Y. W., RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital. In: Hawaii International Conference on System Sciences. IEEE, pp. 184a-194a, 2006.
-
(2006)
Hawaii International Conference on System Sciences
-
-
Wang, S.W.1
Chen, W.H.2
Ong, C.S.3
Liu, L.4
Chuang, Y.W.5
-
2
-
-
79953096361
-
Privacy and security requirements for RFID applications
-
Hwang, M. S., Wei, C. H., and Lee, C. Y., Privacy and security requirements for RFID applications. J. Comput. 20(3):55-60, 2009.
-
(2009)
J. Comput.
, vol.20
, Issue.3
, pp. 55-60
-
-
Hwang, M.S.1
Wei, C.H.2
Lee, C.Y.3
-
3
-
-
79952440568
-
Real-time location and inpatient care systems based on passive RFID
-
10.1016/j.jnca.2010.04.011
-
Najera, P., Lopez, J., and Roman, R., Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3):980-989, 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.3
, pp. 980-989
-
-
Najera, P.1
Lopez, J.2
Roman, R.3
-
5
-
-
33749661519
-
Hospital gets ultra-wideband RFID
-
Collins, J., Hospital gets ultra-wideband RFID. RFID J, 2004.
-
(2004)
RFID J
-
-
Collins, J.1
-
6
-
-
84876297710
-
-
IEEE
-
Jeong, B., Cheng, C., Prabhu, V., and Yu, B., An RFID application model for surgery patient identification. IEEE, pp. 1-3, 2008.
-
(2008)
An RFID Application Model for Surgery Patient Identification
, pp. 1-3
-
-
Jeong, B.1
Cheng, C.2
Prabhu, V.3
Yu, B.4
-
7
-
-
3242725242
-
Room for tracking. RFID technology finds the way
-
Glabman, M., Room for tracking. RFID technology finds the way. Mater. Manag. Health Care 13(5):26, 2004.
-
(2004)
Mater. Manag. Health Care
, vol.13
, Issue.5
, pp. 26
-
-
Glabman, M.1
-
9
-
-
5144231862
-
Radio frequency tags for identifying legitimate drug products discussed by tech industry
-
Thompson, C. A., Radio frequency tags for identifying legitimate drug products discussed by tech industry. Am. J. Health Syst. Pharm. 61(14):1430-1432, 2004.
-
(2004)
Am. J. Health Syst. Pharm.
, vol.61
, Issue.14
, pp. 1430-1432
-
-
Thompson, C.A.1
-
10
-
-
57549090091
-
Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology
-
10.1016/j.ijmedinf.2008.06.001
-
Katz, J. E., and Rice, R. E., Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. Int. J. Med. Inform. 78(2):104-114, 2009.
-
(2009)
Int. J. Med. Inform.
, vol.78
, Issue.2
, pp. 104-114
-
-
Katz, J.E.1
Rice, R.E.2
-
13
-
-
70350710817
-
RFID-based operation room and medicare system for patient safety enhancement - A case study of keelung branch
-
Yu, C., Chen, C., Liao, P., and Lee, Y., RFID-based operation room and medicare system for patient safety enhancement - a case study of keelung branch. J. Inf. Manag. 15:97-122, 2008.
-
(2008)
J. Inf. Manag.
, vol.15
, pp. 97-122
-
-
Yu, C.1
Chen, C.2
Liao, P.3
Lee, Y.4
-
14
-
-
57349200762
-
Privacy, confidentiality, and electronic medical records
-
10.1136/jamia.1996.96236282
-
Barrows, R. C., Jr., and Clayton, P. D., Privacy, confidentiality, and electronic medical records. J. Am. Med. Inform. Assoc. 3(2):139-148, 1996.
-
(1996)
J. Am. Med. Inform. Assoc.
, vol.3
, Issue.2
, pp. 139-148
-
-
Barrows Jr., R.C.1
Clayton, P.D.2
-
15
-
-
0036318237
-
If electronic medical records are so great, why aren't family physicians using them?
-
Loomis, G. A., Ries, J. S., Saywell, R. M., and Thakker, N. R., If electronic medical records are so great, why aren't family physicians using them? J. Fam. Pract. 51(7):636-641, 2002.
-
(2002)
J. Fam. Pract.
, vol.51
, Issue.7
, pp. 636-641
-
-
Loomis, G.A.1
Ries, J.S.2
Saywell, R.M.3
Thakker, N.R.4
-
16
-
-
34547630116
-
-
Florida State University, Department of Computer Science, Tech Rep
-
Chatmon, C., van Le, T., and Burmester, M., Secure anonymous RFID authentication protocols. Florida State University, Department of Computer Science, Tech Rep, pp. 1-10, 2006.
-
(2006)
Secure anonymous RFID authentication protocols
, pp. 1-10
-
-
Chatmon, C.1
Van Le, T.2
Burmester, M.3
-
17
-
-
70449485299
-
Secure access control schemes for RFID systems with anonymity
-
Japan, IEEE
-
Chien, H. Y., Secure access control schemes for RFID systems with anonymity. FMUIT'06, Japan, IEEE, pp. 96-96, 2006.
-
(2006)
FMUIT'06
, pp. 96-96
-
-
Chien, H.Y.1
-
18
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
IEEE
-
Luo, Z., Chan, T., and Li, J. S., A lightweight RFID protocol to protect against traceability and cloning attacks. IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks (ICEBE'05), IEEE, pp. 59-66, 2005.
-
(2005)
IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks (ICEBE'05)
, pp. 59-66
-
-
Luo, Z.1
Chan, T.2
Li, J.S.3
-
19
-
-
33751513718
-
Enhancing security of EPCglobal Gen-2 RFID against traceability and cloning
-
Duc, D. N., Lee, H., and Kim, K., Enhancing security of EPCglobal Gen-2 RFID against traceability and cloning. Symposium on Cryptography and Information Security, 2006.
-
(2006)
Symposium on Cryptography and Information Security
-
-
Duc, D.N.1
Lee, H.2
Kim, K.3
-
20
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
IEEE
-
Henrici, D., and Muller, P., Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. PerSec′04. IEEE, pp. 149-153, 2004.
-
(2004)
PerSec'04
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
21
-
-
33745938362
-
RFID security without extensive cryptography
-
ACM
-
Karthikeyan, S., and Nesterenko, M. RFID security without extensive cryptography. SASN, 2005. ACM, pp. 63-67, 2005.
-
(2005)
SASN, 2005
, pp. 63-67
-
-
Karthikeyan, S.1
Nesterenko, M.2
-
22
-
-
84876288885
-
Symposium on Cryptography and Information Security
-
Hiroshima
-
Lee, S., Asano, T., and Kim, K., RFID Mutual Authentication Scheme based on Synchronized Secret Information. Symposium on Cryptography and Information Security, Hiroshima, p. 98, 2006.
-
(2006)
RFID Mutual Authentication Scheme Based on Synchronized Secret Information
, pp. 98
-
-
Lee, S.1
Asano, T.2
Kim, K.3
-
23
-
-
49049090312
-
Secure and low-cost RFID authentication protocols
-
Florida State University, Department of Computer Science, Tallahassee, Florida, USA
-
Lee, Y. K., and Verbauwhede, I., Secure and low-cost RFID authentication protocols. In: Adaptive Wireless Networks (AWiN). Florida State University, Department of Computer Science, Tallahassee, Florida, USA, pp. 1-5, 2005.
-
(2005)
Adaptive Wireless Networks (AWiN)
, pp. 1-5
-
-
Lee, Y.K.1
Verbauwhede, I.2
-
24
-
-
33845476062
-
-
IEEE
-
Luo, Z., Chan, T., and Li, J. S., A lightweight mutual authentication protocol for RFID networks. IEEE, pp. 620-625, 2005.
-
(2005)
A Lightweight Mutual Authentication Protocol for RFID Networks
, pp. 620-625
-
-
Luo, Z.1
Chan, T.2
Li, J.S.3
-
25
-
-
24944582157
-
Efficient authentication for low-cost RFID systems
-
Lee, S., Hwang, Y., Lee, D., and Lim, J., Efficient authentication for low-cost RFID systems. Computational Science and Its Applications (ICCSA):619-627, 2005.
-
(2005)
Computational Science and Its Applications (ICCSA)
, pp. 619-627
-
-
Lee, S.1
Hwang, Y.2
Lee, D.3
Lim, J.4
-
26
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Molnar, D., and Wagner, D., Privacy and security in library RFID: Issues, practices, and architectures. ACM, pp. 210-219, 2004.
-
(2004)
ACM
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
27
-
-
24944575863
-
-
MIT Cambridge
-
Ohkubo, M., Suzuki, K., and Kinoshita, S., Cryptographic approach to "privacy-friendly" tags. MIT, Cambridge, 2003.
-
(2003)
Cryptographic Approach to "privacy-friendly" Tags
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
28
-
-
33749043889
-
-
Weis, S., Sarma, S., Rivest, R., and Engels, D., Security and privacy aspects of low-cost radio frequency identification systems. Security in pervasive computing. pp. 50-59, 2004.
-
(2004)
Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems. Security in Pervasive Computing
, pp. 50-59
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
29
-
-
85015582598
-
On the keyspace of the Hill cipher
-
10.1080/0161-110591893771
-
Overbey, J., Traves, W., and Wojdylo, J., On the keyspace of the Hill cipher. Cryptologia 29(1):59-72, 2005.
-
(2005)
Cryptologia
, vol.29
, Issue.1
, pp. 59-72
-
-
Overbey, J.1
Traves, W.2
Wojdylo, J.3
-
30
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
Shoup, V. Sequences of games: a tool for taming complexity in security proofs. cryptology eprint archive, report 2004/332, 2004.
-
(2004)
Cryptology Eprint Archive, Report 2004/332
-
-
Shoup, V.1
|