-
2
-
-
84876747663
-
-
EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1. 2. 0, EPCglobal
-
EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1.2.0, EPCglobal
-
-
-
-
3
-
-
49049105769
-
Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications
-
April
-
S. Devadas, G. E. Suh, S. Praal, R. Sowell, T. Ziola, V. Khandelwal, "Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications", Proceedings of the IEEE International Conference on RFID, April 2008, pp. 58-64.
-
(2008)
Proceedings of the IEEE International Conference on RFID
, pp. 58-64
-
-
Devadas, S.1
Suh, G.E.2
Praal, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
4
-
-
84865773973
-
PUMAP: PUF-based ultra-lightweight mutual-authentication RFID protocol
-
March
-
R. Bassil, W. El-Beaino, W. Itanti, A. Kayssi, A. Chehab, "PUMAP : PUF-based Ultra-Lightweight Mutual-Authentication RFID Protocol, " Internation Journal of RFID Security an Cryptography, vol. 1, March 2012, pp. 58-66.
-
(2012)
Internation Journal of RFID Security An Cryptography
, vol.1
, pp. 58-66
-
-
Bassil, R.1
El-Beaino, W.2
Itanti, W.3
Kayssi, A.4
Chehab, A.5
-
5
-
-
49049105768
-
HB-MP + protocol: An improvement on the HB-MP protocol
-
April
-
X. Leng, K. Mayes, K. Markantonakis, "HB-MP + protocol: an improvement on the HB-MP protocol, " IEEE International Conference on RFID, April 2008, pp. 118-124.
-
(2008)
IEEE International Conference on RFID
, pp. 118-124
-
-
Leng, X.1
Mayes, K.2
Markantonakis, K.3
-
6
-
-
57849111802
-
An improvement on RFID authentication protocol with privacy protection
-
November
-
Y.-C. Lee, Y.-C. Hsieh, P.-S. You, T.-C. Chen, "An improvement on RFID authentication protocol with privacy protection, " Third International Conference on Convergence and Hybrid Information Technology - ICCIT 2008, vol. 2, November 2008, pp. 569-573.
-
(2008)
Third International Conference on Convergence and Hybrid Information Technology-ICCIT 2008
, vol.2
, pp. 569-573
-
-
Lee, Y.-C.1
Hsieh, Y.-C.2
You, P.-S.3
Chen, T.-C.4
-
7
-
-
33144457479
-
RFID security and privacy: A research survey
-
Feb.
-
A. Juels, "RFID security and privacy: a research survey, " IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, Feb. 2006, pp. 381-394.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
8
-
-
77956166753
-
A HMAC-based RFID authentication protocol
-
July
-
S. Wang, Q-m, Ma, Y-l. Zhang, and Y-s, Li, "A HMAC-Based RFID Authentication Protocol, " 2nd International Symposium on Infromation Engineering and Electronic Commerce (IEEC), July 2010, pp. 1-4.
-
(2010)
2nd International Symposium on Infromation Engineering and Electronic Commerce (IEEC)
, pp. 1-4
-
-
Wang, S.1
Ma, Q.-M.2
Zhang, Y.-L.3
Li, Y.-S.4
-
9
-
-
78751647847
-
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
-
S-S. Yeo, J-S. Cho and S. K. Kim. "Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value, " Computer Communication, vol. 34, 2011 pp. 391-397.
-
(2011)
Computer Communication
, vol.34
, pp. 391-397
-
-
Yeo, S.-S.1
Cho, J.-S.2
Kim, S.K.3
-
10
-
-
33745654539
-
RFID-tags for anti-counterfeiting, topics in cryptology CT-RSA
-
P.Tuyls, L.Batina, "RFID-tags for Anti-Counterfeiting, Topics in Cryptology CT-RSA, " Lecture Notes in Computer Science, Vol.3860, 2006, pp.115-131
-
(2006)
Lecture Notes in Computer Science
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
12
-
-
77956425492
-
Efficient and practical authentication of PUF-based RFID tags in supply chains
-
June
-
P.Cortese, F.Gemmiti, B.Palazzi, et al. "Efficient and Practical Authentication of PUF-Based RFID Tags in Supply Chains, " IEEE International Conference on RFID-Technology and Applications (RFIDTA), June 2010, pp.182-188.
-
(2010)
IEEE International Conference on RFID-Technology and Applications (RFIDTA)
, pp. 182-188
-
-
Cortese, P.1
Gemmiti, F.2
Palazzi, B.3
-
13
-
-
55349112850
-
A tamper-proof and lightweight authentication scheme
-
H.Ghaith, O.Erdinc, S.Berk, "A Tamper-Proof and Lightweight Authentication Scheme, ", Pervasive Mobile Computing, Vol.4(6), 2008, pp. 807-818.
-
(2008)
Pervasive Mobile Computing
, vol.4
, Issue.6
, pp. 807-818
-
-
Ghaith, H.1
Erdinc, O.2
Berk, S.3
-
14
-
-
77953303552
-
Lightweight mutual authentication and ownership transfer for RFID systems
-
March
-
L. Kulseng, Z. Yu, Y. Wei, and Y. Guan, "Lightweight Mutual Authentication and Ownership Transfer for RFID systems, " Proc. Of IEEE INFOCOM 2010, March 2010, pp. 1-5.
-
(2010)
Proc. of IEEE INFOCOM 2010
, pp. 1-5
-
-
Kulseng, L.1
Yu, Z.2
Wei, Y.3
Guan, Y.4
-
15
-
-
79955894210
-
Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID system
-
March
-
M. Akgun, M.S. Kiraz, and H. Demirci, "Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID System, " IEEE Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec), March 2011, pp. 20-25.
-
(2011)
IEEE Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec)
, pp. 20-25
-
-
Akgun, M.1
Kiraz, M.S.2
Demirci, H.3
-
16
-
-
84876749716
-
-
SHA-1 Standard, Secure Hash Standard, FIPS PUB 180-1
-
National Institute of Standards and Technology (NIST), SHA-1 Standard, Secure Hash Standard, " FIPS PUB 180-1, www.itl.nist.gov/fipspubs/fip180-1. htm, 1995.
-
(1995)
-
-
-
18
-
-
85015297481
-
Cryptanalysis of Cho et al.'s protocol
-
M. Safkhani, P. Peris-Lopez, J. C. Hernandez-Castro, N. Bagheri, and M. Naderi, "Cryptanalysis of Cho et al.'s protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems, " http://eprint.iacr.org/2011/ 331.pdf, 2011.
-
(2011)
A Hash-Based Mutual Authentication Protocol for RFID Systems
-
-
Safkhani, M.1
Peris-Lopez, P.2
Hernandez-Castro, J.C.3
Bagheri, N.4
Naderi, M.5
|