-
1
-
-
77953725595
-
Survivable RFID Systems: Issues, Challenges, and Techniques
-
Y. Zuo, "Survivable RFID Systems: Issues, Challenges, and Techniques, " IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews, Vol.40, No.4, pp.406-418, 2010.
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews
, vol.40
, Issue.4
, pp. 406-418
-
-
Zuo, Y.1
-
2
-
-
33144457479
-
RFID Security and Privacy: A Research Survey
-
A. Juels, "RFID Security and Privacy: A Research Survey, " IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 381-394, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
3
-
-
84867250356
-
A Forward-Secure Grouping-proof Protocol for Multiple RFID tags
-
Y. Liu, X. Qin, B. Li, L. Liu, "A Forward-Secure Grouping-proof Protocol for Multiple RFID tags, " International Journal of Computational Intelligence Systems, Vol.5, No.5, pp.824-833, 2012.
-
(2012)
International Journal of Computational Intelligence Systems
, vol.5
, Issue.5
, pp. 824-833
-
-
Liu, Y.1
Qin, X.2
Li, B.3
Liu, L.4
-
4
-
-
84875171185
-
Security Protocol for RFID System Conforming to EPC-C1G2 Standard
-
F. Xiao, Y. Zhou, J. Zhou, et al, "Security Protocol for RFID System Conforming to EPC-C1G2 Standard, " Journal of Computers, Vol.8, No.3, pp. 605-612, 2013.
-
(2013)
Journal of Computers
, vol.8
, Issue.3
, pp. 605-612
-
-
Xiao, F.1
Zhou, Y.2
Zhou, J.3
-
5
-
-
84883728510
-
An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol
-
X. Ren, X. Xu, Y. Li, "An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol, " Journal of Computers, Vol.8, No.9, pp. 2405-2412, 2013.
-
(2013)
Journal of Computers
, vol.8
, Issue.9
, pp. 2405-2412
-
-
Ren, X.1
Xu, X.2
Li, Y.3
-
6
-
-
84870622380
-
Cryptanalysis of a Scalable Grouping-proof Protocol for RFID Tags
-
Y. Liu, X. Qin, B. Li, L. Liu, "Cryptanalysis of a Scalable Grouping-proof Protocol for RFID Tags, " International Journal of Digital Content Technology and its Applications, Vol. 6, No. 21, pp. 247-254, 2012.
-
(2012)
International Journal of Digital Content Technology and its Applications
, vol.6
, Issue.21
, pp. 247-254
-
-
Liu, Y.1
Qin, X.2
Li, B.3
Liu, L.4
-
7
-
-
38149038702
-
On Privacy Models for RFID
-
LNCS 4833, Springer-Verlag, Berlin
-
S. Vaudenay, "On Privacy Models for RFID, " Proc. Adances in Cryptology (ASIA CRYPT'07), LNCS 4833, Springer-Verlag, Berlin, pp. 68-87, 2007.
-
(2007)
Proc. Adances in Cryptology (ASIA CRYPT'07)
, pp. 68-87
-
-
Vaudenay, S.1
-
8
-
-
70350639755
-
-
In: R. Avanzi, L. Keliher, F. Sica (Eds.): SAC 2008, LNCS 5381, Springer-Verlag
-
D. Hein, J. Wolkerstorfer, and N. Felber, "ECC is Ready for RFID-a Proof in Silicon, " In: R. Avanzi, L. Keliher, F. Sica (Eds.): SAC 2008, LNCS 5381, pp. 401-413, Springer-Verlag, 2009.
-
(2009)
ECC is Ready for RFID-a Proof in Silicon
, pp. 401-413
-
-
Hein, D.1
Wolkerstorfer, J.2
Felber, N.3
-
9
-
-
54049143316
-
Elliptic Curve based Security Processor for RFID
-
Y.-K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic Curve based Security Processor for RFID, " IEEE Trans. Comput. Vol.57, No.4, pp. 1514-1527, 2008.
-
(2008)
IEEE Trans. Comput.
, vol.57
, Issue.4
, pp. 1514-1527
-
-
Lee, Y.-K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
10
-
-
36248971663
-
LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags
-
Graz, Austria, July
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags, " Proc. Second Workshop RFID Security, Graz, Austria, pp.12-14, July, 2006.
-
(2006)
Proc. Second Workshop RFID Security
, pp. 12-14
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
11
-
-
33845455482
-
EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags
-
LNCS 4277, Springer-Verlag, Nov
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags, " Proc. OTM Federated Conf. and Workshop: IS Workshop (IS'06), LNCS 4277, Springer-Verlag, pp. 352-361, Nov. 2006.
-
(2006)
Proc. OTM Federated Conf. and Workshop: IS Workshop (IS'06)
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
12
-
-
33750067948
-
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags
-
LNCS 4159
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags, " Proc. Int'l Conf. Ubiquitous Intelligence and Computing (UIC'06), LNCS 4159, pp. 912-923, 2006.
-
(2006)
Proc. Int'l Conf. Ubiquitous Intelligence and Computing (UIC'06)
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
14
-
-
36248977046
-
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
-
Springer, May
-
T. Li and G. Wang, "Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols, " Proc. 22nd IFIP TC-11 International Information Security Conference (IFIP SEC'07), Vol. 232, Springer, pp. 109-120, May, 2007.
-
(2007)
Proc. 22nd IFIP TC-11 International Information Security Conference (IFIP SEC'07)
, vol.232
, pp. 109-120
-
-
Li, T.1
Wang, G.2
-
15
-
-
77952285870
-
Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements
-
July
-
H. Y. Chien and C. W. Huang, "Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements, " ACM Operating System Rev., Vol. 41, No. 2, pp. 83-86, July, 2007.
-
(2007)
ACM Operating System Rev
, vol.41
, Issue.2
, pp. 83-86
-
-
Chien, H.Y.1
Huang, C.W.2
-
16
-
-
34548353243
-
Is Elliptic Curve Cryptography Suitable to Secure RFID Tags?
-
Graz, July
-
J. Wolkerstorfer, "Is Elliptic Curve Cryptography Suitable to Secure RFID Tags?" Proc. Workshop on RFID and Lightweight Crypto, Graz, pp. 13-15, July, 2005.
-
(2005)
Proc. Workshop on RFID and Lightweight Crypto
, pp. 13-15
-
-
Wolkerstorfer, J.1
-
17
-
-
35348832191
-
An Elliptic Curve Processor Suitable for RFID-tags
-
Report2006/227
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "An Elliptic Curve Processor Suitable for RFID-tags, " Cryptology ePrint Archive, Report2006/227, 2006.
-
(2006)
Cryptology ePrint Archive
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
18
-
-
85037166561
-
Privacy-preserving ECC-based grouping proofs for RFID
-
Springer Berlin Heidelberg
-
L. Batina, Y.-K. Lee, and S. Seys, D. Singelée and I. Verbauwhede, "Privacy-preserving ECC-based grouping proofs for RFID, " In: Information Security. Springer Berlin Heidelberg, pp. 159-165, 2011.
-
(2011)
Information Security
, pp. 159-165
-
-
Batina, L.1
Lee, Y.-K.2
Seys, S.3
Singelée, D.4
Verbauwhede, I.5
-
19
-
-
79953702872
-
Security Analysis of a Privacy-Preserving ECC-Based Grouping-Proof Protocol
-
C. Lv, H. Li, J. Ma, B. Niu and H. Jiang, "Security Analysis of a Privacy-Preserving ECC-Based Grouping-Proof Protocol, " Journal of Convergence Information Technology, Vol. 6, No. 3, pp. 113-119, 2011.
-
(2011)
Journal of Convergence Information Technology
, vol.6
, Issue.3
, pp. 113-119
-
-
Lv, C.1
Li, H.2
Ma, J.3
Niu, B.4
Jiang, H.5
-
20
-
-
84887302238
-
A Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID
-
W. Ko, S. Chiou, E. Lu and H. Chang, "A Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID, " Applied Mathematics, Vol. 3 No. 4, pp. 336-341, 2012.
-
(2012)
Applied Mathematics
, vol.3
, Issue.4
, pp. 336-341
-
-
Ko, W.1
Chiou, S.2
Lu, E.3
Chang, H.4
-
21
-
-
58049152104
-
ERAP: ECC based RFID Authentication Protocol
-
S. I. Ahamed, F. Rahman, and E. Hoque, "ERAP: ECC based RFID Authentication Protocol, " Proc.12th IEEE Int. Work shop on Future Trends of Distrib. Comput. Syst. (FTDCS'08), pp. 219-225, 2008.
-
(2008)
Proc.12th IEEE Int. Work shop on Future Trends of Distrib. Comput. Syst. (FTDCS'08)
, pp. 219-225
-
-
Ahamed, S.I.1
Rahman, F.2
Hoque, E.3
-
22
-
-
65249186388
-
A Secure Elliptic Curve-Based RFID Protocol
-
S. Marti{dotless}nez, M. Valls, C. Roig, J.M. Miret, F. Gin, "A Secure Elliptic Curve-Based RFID Protocol, " J. Comput. Sci. Tech. Vol. 24, No. 2, pp. 308-318, 2009.
-
(2009)
J. Comput. Sci. Tech.
, vol.24
, Issue.2
, pp. 308-318
-
-
Martinez, S.1
Valls, M.2
Roig, C.3
Miret, J.M.4
Gin, F.5
-
23
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
N. Koblitz, "Elliptic Curve Cryptosystems, " Math. Comp., Vol. 48, No. 177, pp. 203-209, 1987.
-
(1987)
Math. Comp.
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
24
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
LNCS 218, Springer-Verlag, Berlin
-
V. S. Miller, "Use of Elliptic Curves in Cryptography, " Proc. Cryptology-CRYPTO'85, LNCS 218, Springer-Verlag, Berlin, pp: 417-426, 1986.
-
(1986)
Proc. Cryptology-CRYPTO'85
, pp. 417-426
-
-
Miller, V.S.1
-
25
-
-
54349101762
-
LAMED-A PRNG for EPC Class-1 Generation-2 RFID Specification
-
Jan
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador and A. Ribagorda, "LAMED-A PRNG for EPC Class-1 Generation-2 RFID Specification, " Computer Standards and Interfaces, Vol. 31, pp. 88-97, Jan. 2009.
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 88-97
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
|