-
1
-
-
55649122502
-
A universally compostable secure RFID communication protocol in supply chains [M]
-
(in chinese)
-
Zhang Fan, Sun Xuan, A Universally Composable Secure RFID Comm unication Protocol in Supply Chains [M], China Journal of Computer, 2008, 31(10). (in chinese).
-
(2008)
China Journal of Computer
, vol.31
, Issue.10
-
-
Zhang, F.1
Sun, X.2
-
2
-
-
49049105769
-
Design and Implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications [C]
-
Las Vegas, NV, USA
-
Devadas S, Suh E, Paral. Design and Implementation of PUF-based "unclonable" RFID ICs for Anti-Counterfeiting and Security applications [C], Proceedings of the 2008 IEEE International Conference on RFID, Las Vegas, NV, USA, 2008:58-64.
-
(2008)
Proceedings of the 2008 IEEE International Conference on RFID
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral3
-
4
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures [C]
-
Washington, DC, USA
-
Molnar D, Wagner D.Privacy and security in library RFID:Issues, practices, and architectures [C]. Proceedings of the 11th ACM Conference on Computer and. Communications Security(CCS'04), Washington, DC, USA, 2004:210-219.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04)
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
8
-
-
84876027702
-
Some methods for privacy in RFID communication [C], Security in ad-hoc and sensor networks
-
Berlin, Heidelberg: Springer-Verlag
-
Fishkin K, Roy S, Jiang B. Some methods for privacy in RFID communication [C]. Security in Ad-hoc and Sensor Networks, Proceedings of the 1st European Workshop on Security (ESAS'04), Berlin, Heidelberg:Springer-Verlag, 2004:42-53.
-
(2004)
Proceedings of the 1st European Workshop on Security (ESAS'04)
, pp. 42-53
-
-
Fishkin, K.1
Roy, S.2
Jiang, B.3
-
9
-
-
84876021752
-
Time measurement threatens privacy-friendly RFID authentication protocols [C]
-
Istanbul, Turkey
-
Gildas Avoine, Iwen Coisel, Tania Martin. Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols [C]. In Workshop on RFID Security(RFIDSec'10), Istanbul, Turkey, 2010.
-
(2010)
Workshop on RFID Security (RFIDSec'10)
-
-
Gildas, A.1
Iwen, C.2
Tania, M.3
-
12
-
-
33744964854
-
Design and analysis of cryptograph IC protocols for RFID [M]
-
(in chinese)
-
Zhou Yong-Bin, Feng Deng-Guo, Design and Analysis of Cryptograph ic Protocols for RFID [M], China Journal of Computer, 2006, 29(4). (in chinese).
-
(2006)
China Journal of Computer
, vol.29
, Issue.4
-
-
Zhou, Y.-B.1
Feng, D.-G.2
-
14
-
-
65349109748
-
Research on hash-based RFID security authentication protocol [M]
-
Ding Zhenhua, Li Jintao, Feng Bo, Research on Hash-Based RFID Security Authentication ProtocolM], Journal of computer research and development, 2009, 46(4).
-
(2009)
Journal of Computer Research and Development
, vol.46
, Issue.4
-
-
Ding, Z.1
Li, J.2
Feng, B.3
-
15
-
-
36248982045
-
SASI: A new ultra lightweight RFID authentication protocol providing strong authentication and strong integrity [J]
-
H Y Chien. SASI:A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity [J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4):337-340.
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.Y.1
|