-
1
-
-
83455217353
-
Improvement of Filtering Algorithm for RFID Middleware Using KDB-tree Query Index
-
X. B Zhang, L. L Cheng, Q. M Zhu, "Improvement of Filtering Algorithm for RFID Middleware Using KDB-tree Query Index", Journal of Software, vol.6, No.12, pp2521-2527, 2011.
-
(2011)
Journal of Software
, vol.6
, Issue.12
, pp. 2521-2527
-
-
Zhang, X.B.1
Cheng, L.L.2
Zhu, Q.M.3
-
2
-
-
55749092929
-
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
-
P. Peris-Lopez, J. C. H. Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard", Computer Standards and Interfaces, vol.31, No.2, pp372-380, 2009.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.2
, pp. 372-380
-
-
Peris-Lopez, P.1
Castro, J.C.H.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
3
-
-
79951821097
-
Research on RFID Integration Middleware for Enterprise Information System
-
M. B Li, H. Li, "Research on RFID Integration Middleware for Enterprise Information System", Journal of Software, vol.6, No.2, pp167-174, 2011.
-
(2011)
Journal of Software
, vol.6
, Issue.2
, pp. 167-174
-
-
Li, M.B.1
Li, H.2
-
4
-
-
79960793886
-
The design and realization of a Lightweight RFID Mechanism Integrating Security and Anti-collision
-
S. S Yu, Y. Peng, J. Yang, J. J Zhang, "The design and realization of a Lightweight RFID Mechanism Integrating Security and Anti-collision", Journal of Software, vol.6, No.7, pp1235-1240, 2011.
-
(2011)
Journal of Software
, vol.6
, Issue.7
, pp. 1235-1240
-
-
Yu, S.S.1
Peng, Y.2
Yang, J.3
Zhang, J.J.4
-
5
-
-
84860330702
-
A Novel Method for Modeling RFID Data
-
K. Bai, S. X Li, T. Liu, J. Tian, "A Novel Method for Modeling RFID Data", Journal of Software, vol.7, No.4, pp835-843, 2012.
-
(2012)
Journal of Software
, vol.7
, Issue.4
, pp. 835-843
-
-
Bai, K.1
Li, S.X.2
Liu, T.3
Tian, J.4
-
6
-
-
70349155465
-
-
2nd ACM Conference on Wireless Network Security (WiSec'09)
-
S. Cai, Y. Li, T. Li and R. Deng, "Attacks and improvements to an RFID mutual authentication protocol",2nd ACM Conference on Wireless Network Security (WiSec'09), pp51-58, 2009
-
(2009)
Attacks and improvements to an RFID mutual authentication protocol
, pp. 51-58
-
-
Cai, S.1
Li, Y.2
Li, T.3
Deng, R.4
-
7
-
-
85008055668
-
Secure and serverless RFID authentication and search protocols
-
CC. Tan, B. Sheng and Q. Li, "Secure and serverless RFID authentication and search protocols", IEEE Transtracitons on Wireless Communications, vol.7, No.4, pp1400-1407, 2008.
-
(2008)
IEEE Transtracitons on Wireless Communications
, vol.7
, Issue.4
, pp. 1400-1407
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
8
-
-
38149049144
-
Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
-
S. Han, V. Potgar and E. Chang, "Mutual authentication protocol for RFID tags based on synchronized secret information with monitor", Proceedings of ICCSA, Lecture Notes in Computer Science, vol.4707, pp227-238,2007.
-
(2007)
Proceedings of ICCSA, Lecture Notes in Computer Science
, vol.4707
, pp. 27-238
-
-
Han, S.1
Potgar, V.2
Chang, E.3
-
9
-
-
38149094945
-
A Study on low-cost RFID system management with mutual authentication scheme in ubiquitous
-
S.Y. Kang and I.Y. Lee, "A Study on low-cost RFID system management with mutual authentication scheme in ubiquitous", Proceedings of APNOMS, Lecture Notes in Computer Science, vol.4773, pp. 492-502, 2007.
-
(2007)
Proceedings of APNOMS, Lecture Notes in Computer Science
, vol.4773
, pp. 492-502
-
-
Kang, S.Y.1
Lee, I.Y.2
-
10
-
-
55749110412
-
A minimalist mutual authentication protocol for RFID system and BAN logic analysis
-
C. Qingling, Z. Yiju, W. Yonghua, "A minimalist mutual authentication protocol for RFID system and BAN logic analysis", ISECS International Colloquium on Computing, Communication, Control, and Management. pp.449-453,2008.
-
(2008)
ISECS International Colloquium on Computing, Communication, Control, and Management.
, pp. 449-453
-
-
Qingling, C.1
Yiju, Z.2
Yonghua, W.3
-
11
-
-
83455199100
-
An Improved RFID Localization Algorithm Based on Layer By Layer Exclusion
-
H. T Zhang and P Miao, "An Improved RFID Localization Algorithm Based on Layer By Layer Exclusion", Journal of Computers, vol. 6, No 12, pp.2734-2739, 2011.
-
(2011)
Journal of Computers
, vol.6
, Issue.12
, pp. 2734-2739
-
-
Zhang, H.T.1
Miao, P.2
-
12
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
-
H. Y. Chien and C. H. Chen, "Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards", Computer Standards and Interfaces, vol.29, No.2, pp. 254-259,2007.
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.Y.1
Chen, C.H.2
-
13
-
-
65749095202
-
Practical attacks on a mutual authentication scheme under the EPCClass-1Generation-2standard
-
P. Peris-Lopez, T. Li, T.L. Lim, J.C. Hernandez-Castro, and J.M. Estevez-Tapiador, "Practical attacks on a mutual authentication scheme under the EPCClass-1Generation-2standard", Computer Communications, vol.32, No7, pp.1185-1193,2008.
-
(2008)
Computer Communications
, vol.32
, Issue.7
, pp. 1185-1193
-
-
Peris-Lopez, P.1
Li, T.2
Lim, T.L.3
Hernandez-Castro, J.C.4
Estevez-Tapiador, J.M.5
-
14
-
-
70350572865
-
Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection
-
C. L. Chen and Y.Y. Deng, "Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection", Engineering Applications of Artificial Intelligence, vol.22, No.8, pp.1284-1291,2009.
-
(2009)
Engineering Applications of Artificial Intelligence
, vol.22
, Issue.8
, pp. 1284-1291
-
-
Chen, C.L.1
Deng, Y.Y.2
-
15
-
-
79959978275
-
Cryptanalysis of an EPC class-1generation-2 standard compliant authentication protocol
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. E. Tapiador, and J. C. A. van der Lubbe, "Cryptanalysis of an EPC class-1generation-2 standard compliant authentication protocol". Engineering Applications of Artificial Intelligence, vol.24, No.6, pp. 1061-1069, 2011.
-
(2011)
Engineering Applications of Artificial Intelligence
, vol.24
, Issue.6
, pp. 1061-1069
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Tapiador, J.E.3
van der Lubbe, J.C.A.4
-
16
-
-
77957851534
-
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
-
T. C. Yeh, Y. J Wang, T. C. Kuo and S. S. Wang, " Securing RFID systems conforming to EPC Class 1 Generation 2 standard", Expert Systems with Applications, vol.37, No 12, pp. 7678-7683, 2011.
-
(2011)
Expert Systems with Applications
, vol.37
, Issue.12
, pp. 7678-7683
-
-
Yeh, T.C.1
Wang, Y.J.2
Kuo, T.C.3
Wang, S.S.4
-
17
-
-
81855161588
-
Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard
-
E.-J. Yoon. "Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard". Expert Systems with Applications, vol.39, No1, pp. 1589-1594,2012.
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.1
, pp. 1589-1594
-
-
Yoon, E.-J.1
|