-
1
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
-
February
-
H. Chien and C. Chen, Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, 29(2):254-259, February 2007.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.1
Chen, C.2
-
2
-
-
84883724489
-
Enhancing Security of EPCGlobal Gen-2 RFID against Traceability and cloning
-
Dang Nguyen Duc, Hyunrok Lee and Kwangjo Kim. Enhancing Security of EPCGlobal Gen-2 RFID against Traceability and cloning. Auto-ID Labs White Paper WPSWNET- 016, 2006.
-
(2006)
Auto-ID Labs White Paper WPSWNET-
, pp. 016
-
-
Duc, D.N.1
Lee, H.2
Kim, K.3
-
3
-
-
70449119277
-
Security and privacy risks of embedded RFID in everyday things: The e-passport and beyond
-
Meingast Marci, King Jennifer and Mulligan Deirdre K. Security and privacy risks of embedded RFID in everyday things: The e-passport and beyond. Journal of Communications, v 2, n 7, p 36-48, 2007.
-
(2007)
Journal of Communications
, vol.2
, Issue.7
, pp. 36-48
-
-
Marci, M.1
Jennifer, K.2
Mulligan, D.K.3
-
4
-
-
84865164900
-
RFID-based electronic identity security cloud platform in cyberspace
-
Chen Bing, Tan Chengxiang, Jin Bo, Zou Xiang and Dai Yuebo. RFID-based electronic identity security cloud platform in cyberspace. Journal of Networks, v 7, n 7, p 1131-1138, 2012.
-
(2012)
Journal of Networks
, vol.7
, Issue.7
, pp. 1131-1138
-
-
Bing, C.1
Chengxiang, T.2
Bo, J.3
Xiang, Z.4
Yuebo, D.5
-
5
-
-
77949852436
-
Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols
-
MARCH
-
Gaurav Kapoor and Selwyn Piramuthu. Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols. IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 3, MARCH 2010.
-
(2010)
IEEE COMMUNICATIONS LETTERS
, vol.12
, Issue.3
-
-
Kapoor, G.1
Piramuthu, S.2
-
6
-
-
43449134072
-
Lightweight cryptographic authentication in passive RFID-tagged systems
-
S. Piramuthu, "Lightweight cryptographic authentication in passive RFID-tagged systems," IEEE Trans. Systems, Man, and Cybernetics -Part C, vol. 38, no. 3, pp. 360-376, 2008.
-
(2008)
IEEE Trans. Systems, Man, and Cybernetics -Part C
, vol.38
, Issue.3
, pp. 360-376
-
-
Piramuthu, S.1
-
8
-
-
80455155201
-
Zero-Knowledge Authentication Protocol Based on Alternative Mode in RFID Systems'
-
H. Liu, H. Ning,:' Zero-Knowledge Authentication Protocol Based on Alternative Mode in RFID Systems', IEEE Sensors Journal, Dec. 2011,Vol. 11, No. 12, pp.3235-3245.
-
(2011)
IEEE Sensors Journal
, vol.11
, Issue.12
, pp. 3235-3245
-
-
Liu, H.1
Ning, H.2
-
9
-
-
80053220372
-
Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems'
-
H. Ning, H. Liu, J. Mao, Y. Zhang.:' Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems', IET Communications, 2011,vol. 5, lss.12, pp.1755-1768
-
(2011)
IET Communications
, vol.5
, Issue.12
, pp. 1755-1768
-
-
Ning, H.1
Liu, H.2
Mao, J.3
Zhang, Y.4
-
10
-
-
67649484364
-
A Gen2-based RFID authentication protocol for security and privacy
-
Sun, H.M., Ting, W.C.: 'A Gen2-based RFID authentication protocol for security and privacy', IEEE Trans. Mob. Comput. 2009, 8, (8), pp. 1052-1062
-
(2009)
IEEE Trans. Mob. Comput
, vol.8
, Issue.8
, pp. 1052-1062
-
-
Sun, H.M.1
Ting, W.C.2
-
11
-
-
84870563092
-
Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel
-
JANUARY
-
K. Sakai, W. Ku, R. Zimmermann, M. Sun, Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel. IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 1, JANUARY 2013,pp.112-123
-
(2013)
IEEE TRANSACTIONS ON COMPUTERS
, vol.62
, Issue.1
, pp. 112-123
-
-
Sakai, K.1
Ku, W.2
Zimmermann, R.3
Sun, M.4
-
12
-
-
84862788058
-
A New Ultralightweight RFID Authentication Protocol with Permutation
-
MAY
-
Y. Tian, G. Chen, and J. Li. A New Ultralightweight RFID Authentication Protocol with Permutation. IEEE COMMUNICATIONS LETTERS, VOL. 16, NO. 5, MAY 2012, pp.702-705
-
(2012)
IEEE COMMUNICATIONS LETTERS
, vol.16
, Issue.5
, pp. 702-705
-
-
Tian, Y.1
Chen G.Li, J.2
-
13
-
-
56749103027
-
RFID authentication protocol for Low-cost Tags
-
March
-
B. Song and C. J Mitchell, RFID authentication protocol for Low-cost Tags, In the Proceedings of WiSec'08, March 2008, pp. 140-147.
-
(2008)
In the Proceedings of WiSec'08
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
14
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Rhee, K., Kwak, J., Kim, S., Won, D.: 'Challenge-response based RFID authentication protocol for distributed database environment', Secur. Pervasive Comput., 2005, 3450, pp. 70-84
-
(2005)
Secur. Pervasive Comput
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
15
-
-
84865741288
-
A minimum disclosure approach to authentication and privacy in RFID systems
-
R. Doss, W. Zhou, S. Sundaresan, S. Yu, L. Gao. A minimum disclosure approach to authentication and privacy in RFID systems. Computer Networks 56 (2012) 3401-3416.
-
(2012)
Computer Networks
, vol.56
, pp. 3401-3416
-
-
Doss, R.1
Zhou, W.2
Sundaresan, S.3
Yu, S.4
Gao, L.5
-
16
-
-
84864549429
-
A Server Independent Authentication Scheme for RFID Systems
-
Bin Wang and Maode Ma. A Server Independent Authentication Scheme for RFID Systems. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 8, NO. 3, AUG. 2012,pp.689-696
-
(2012)
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
, vol.8
, Issue.3
, pp. 689-696
-
-
Wang, B.1
Ma, M.2
-
17
-
-
35048859848
-
Strong authentication for RFID aystems using the AES algorithm
-
LNCS
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID aystems using the AES algorithm," in Proc. Cryptogr.Hardw. Embed. Syst., CHES'04, 2004, vol. 3156, LNCS, pp. 357-370.
-
(2004)
Proc. Cryptogr.Hardw. Embed. Syst., CHES'04
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
18
-
-
58049152104
-
ERAP: ECC based RFID authentication protocol
-
S. I. Ahamed, F. Rahman, and E. Hoque, "ERAP: ECC based RFID authentication protocol," in Proc. 12th IEEE Int. Workshop on Future Trends of Distrib. Comput. Syst. (FTDCS'08), 2008, pp. 219-225.
-
(2008)
Proc. 12th IEEE Int. Workshop On Future Trends of Distrib. Comput. Syst. (FTDCS'08)
, pp. 219-225
-
-
Ahamed, S.I.1
Rahman, F.2
Hoque, E.3
-
19
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
Research in Security and Privacy, California, USA, May
-
Gong, L., Needham, R., Yahalom, R.: 'Reasoning about belief in cryptographic protocols'. Proc. IEEE Computer Society Symp. Research in Security and Privacy, California, USA, May 1990,pp. 234-248
-
(1990)
Proc. IEEE Computer Society Symp
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
20
-
-
77954279962
-
Security analysis of the simple lightweight authentication protocol
-
French Alps, France
-
Godor, G., Imre, S.: Security analysis of the simple lightweight authentication protocol'. Proc. 2010 Ninth Int. Conf. Networks (ICN), French Alps, France, April 2010, pp. 231-236
-
(2010)
Proc. 2010 Ninth Int. Conf. Networks (ICN)
, pp. 231-236
-
-
Godor, G.1
Imre, S.2
-
21
-
-
73049106910
-
Optimization between AES security and performance for IEEE 802.15.3 WPAN
-
Olteanu, A., Xiao, Y., Zhang, Y.: 'Optimization between AES security and performance for IEEE 802.15.3 WPAN', IEEE Trans. Wirel. Commun., 2009, 8, (12), pp. 6030- 6037
-
(2009)
IEEE Trans. Wirel. Commun
, vol.8
, Issue.12
, pp. 6030-6037
-
-
Olteanu, A.1
Xiao, Y.2
Zhang, Y.3
-
24
-
-
84883677433
-
-
Final report of European project IST-1999- 12324: New European schemes for signatures, integrity, and encryption. Available at, April
-
B. Preneel et al. Final report of European project IST-1999- 12324: New European schemes for signatures, integrity, and encryption. Available at: www.cosic.esat.kuleuven.be/nessie/, April 2004.
-
(2004)
-
-
Preneel, B.1
-
25
-
-
33745866296
-
A compact FPGA implementation of the hash function whirlpool
-
ACM Press, New York
-
N. Pramstaller, C. Rechberger, and V. Rijmen. A compact FPGA implementation of the hash function whirlpool. In ACM/SIGDA 14th international symposium on Field Programmable Gate Arrays - FPGA'06, ACM Press, pages 159-166, New York, 2006.
-
(2006)
ACM/SIGDA 14th International Symposium On Field Programmable Gate Arrays - FPGA'06
, pp. 159-166
-
-
Pramstaller, N.1
Rechberger, C.2
Rijmen, V.3
|