-
2
-
-
0004239952
-
RFID Handbook, second edition
-
Wiley & Sons
-
K. Finkenzeller, "RFID Handbook, second edition", Wiley & Sons, (2002).
-
(2002)
-
-
Finkenzeller, K.1
-
3
-
-
24644498485
-
RFID: a technical overview and its application to the enterprise
-
R. Weinstein, "RFID: a technical overview and its application to the enterprise", IT Professionals, vol. 7, (2005), pp. 27-33.
-
(2005)
IT Professionals
, vol.7
, pp. 27-33
-
-
Weinstein, R.1
-
4
-
-
34547367358
-
The pros and cons of RFID in supply chain management
-
K. Michael and L. McCathie, "The pros and cons of RFID in supply chain management", Proc. of ICMB'05, (2005), pp. 623-629.
-
(2005)
Proc. of ICMB'05
, pp. 623-629
-
-
Michael, K.1
McCathie, L.2
-
5
-
-
14244253910
-
An approach to privacy and security of RFID system for supply chain
-
X. Gao, Z. Xiang, H. Wang, J. Shen, J. Huang and S. Song, "An approach to privacy and security of RFID system for supply chain", Proc. of IEEE ICETDE04, (2004), pp. 164-168.
-
(2004)
Proc. of IEEE ICETDE04
, pp. 164-168
-
-
Gao, X.1
Xiang, Z.2
Wang, H.3
Shen, J.4
Huang, J.5
Song, S.6
-
6
-
-
84864772262
-
A Communication Protocol of RFID Systems in Internet of Things
-
H. Gao, Y. Guo, J. Cui, H. Hao and H. Shi, "A Communication Protocol of RFID Systems in Internet of Things", International Journal of Security and Its Applications, vol. 6, no. 2, (2012), pp. 91-102.
-
(2012)
International Journal of Security and Its Applications
, vol.6
, Issue.2
, pp. 91-102
-
-
Gao, H.1
Guo, Y.2
Cui, J.3
Hao, H.4
Shi, H.5
-
7
-
-
33144457479
-
RFID security and privacy: a research survey
-
A. Juels, "RFID security and privacy: a research survey", Selected Areas in Communications, vol. 24, no. 2, (2006), pp. 381-394.
-
(2006)
Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
8
-
-
33745761701
-
Scalable and flexible privacy protection scheme for RFID systems
-
S. Yeo and S. Kim, "Scalable and flexible privacy protection scheme for RFID systems", Lecture Notes in Computer Science, vol. 3813, (2005), pp. 153-163.
-
(2005)
Lecture Notes in Computer Science
, vol.3813
, pp. 153-163
-
-
Yeo, S.1
Kim, S.2
-
10
-
-
33749379761
-
Mutual authentication protocol for low-cost RFID
-
J. Yang, J. Park, H. Lee, K. Ren and K. Kim, "Mutual authentication protocol for low-cost RFID, Proc. of the Workshop on RFID and Lightweight Cryptography, (2005), pp. 17-24.
-
(2005)
Proc. of the Workshop on RFID and Lightweight Cryptography
, pp. 17-24
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
-
11
-
-
84883291589
-
RFID systems and security and privacy implications
-
S. A. Sarma, S. E. Weis and D. W. Engels, "RFID systems and security and privacy implications", Lecture Notes in Computer Science, (2005), vol. 2523, pp. 17-24.
-
(2005)
Lecture Notes in Computer Science
, vol.2523
, pp. 17-24
-
-
Sarma, S.A.1
Weis, S.E.2
Engels, D.W.3
-
14
-
-
33750291916
-
RFID systems: a survey on security threats and proposed solutions
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador and A. Ribagorda, "RFID systems: a survey on security threats and proposed solutions", Lecture Notes in Computer Science, vol. 4217, (2006), pp. 159-170.
-
(2006)
Lecture Notes in Computer Science
, vol.4217
, pp. 159-170
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
17
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S. A. Weis, S. E. Sarma, R. L. Rivest and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems", Security in Pervasive Computing, vol. 2802, (2003), pp. 201-212.
-
(2003)
Security in Pervasive Computing
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
19
-
-
38149050502
-
A family of dunces: trivial RFID identification and authentication protocols
-
G. Tsudik, "A family of dunces: trivial RFID identification and authentication protocols", Proc. of the Symposium on Privacy-Enhancing Technologies, (2007), pp. 45-61.
-
(2007)
Proc. of the Symposium on Privacy-Enhancing Technologies
, pp. 45-61
-
-
Tsudik, G.1
-
20
-
-
34547630116
-
Secure anonymous RFID authentication protocols
-
Florida State University
-
C. Chatmon, T. v. Le and M. Burmester, "Secure anonymous RFID authentication protocols", Technical Report TR-060112, Florida State University, (2006).
-
(2006)
Technical Report TR-060112
-
-
Chatmon, C.1
Le, T.V.2
Burmester, M.3
-
21
-
-
84919847483
-
Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
-
doi:10.1016/j.camwa.2012.02.025
-
J. S. Cho, Y. S. Jeong and S. O. Park, "Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol", Computers and Mathematics with Applications. doi:10.1016/j.camwa.2012.02.025.
-
Computers and Mathematics with Applications
-
-
Cho, J.S.1
Jeong, Y.S.2
Park, S.O.3
-
22
-
-
78751647847
-
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
-
J. S. Cho, S. S. Yeo and S. K. Kim, "Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value", Computer Communications, vol. 34, (2011), pp. 391-397.
-
(2011)
Computer Communications
, vol.34
, pp. 391-397
-
-
Cho, J.S.1
Yeo, S.S.2
Kim, S.K.3
-
23
-
-
84869754446
-
Enhanced hash-based RFID mutual authentication protocol
-
H. S. Kim, "Enhanced hash-based RFID mutual authentication protocol", Communications in Computer and Information Science, (2012), vol. 339, no. 5, pp. 70-77.
-
(2012)
Communications in Computer and Information Science
, vol.339
, Issue.5
, pp. 70-77
-
-
Kim, H.S.1
-
26
-
-
67650674080
-
A Survey of RFID Privacy approaches
-
M. Langheinrich, "A Survey of RFID Privacy approaches", Personal and Ubiquitous Computing, (2009), vol. 13, no. 6, pp. 413-421.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 413-421
-
-
Langheinrich, M.1
-
27
-
-
33750291916
-
RFID Systems: A Survey on Security Threats and Proposed Solutions
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador and A. Ribagorda, "RFID Systems: A Survey on Security Threats and Proposed Solutions", Lecture Notes in Computer Science, vol. 4217, (2006), pp. 159-170.
-
(2006)
Lecture Notes in Computer Science
, vol.4217
, pp. 159-170
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
28
-
-
57849121129
-
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
-
I. Syamsuddin, T. Dillon, E. Chang and S. Han, "A Survey of RFID Authentication Protocols Based on Hash-Chain Method", Proc. of Third International Conference on Convergence and Hybrid Information Technology, (2008), pp. 559-564.
-
(2008)
Proc. of Third International Conference on Convergence and Hybrid Information Technology
, pp. 559-564
-
-
Syamsuddin, I.1
Dillon, T.2
Chang, E.3
Han, S.4
-
29
-
-
78650123975
-
An ECDSA Processor for RFID Authentication
-
M. Hutter, M. Feldhofer and T. Plos, "An ECDSA Processor for RFID Authentication", Lecture Notes in Computer Science, vol. 6370, (2010), pp. 189-202.
-
(2010)
Lecture Notes in Computer Science
, vol.6370
, pp. 189-202
-
-
Hutter, M.1
Feldhofer, M.2
Plos, T.3
|