-
1
-
-
84865691370
-
Data fusion of multi-sensor for IOT precise measurement based on improved PSO algorithms
-
Wen-Tsai Sung, and Ming-Han Tsai Data fusion of multi-sensor for IOT precise measurement based on improved PSO algorithms Computers & Mathematics with Applications 64 5 2012 1450 1461
-
(2012)
Computers & Mathematics with Applications
, vol.64
, Issue.5
, pp. 1450-1461
-
-
Sung, W.-T.1
Tsai, M.-H.2
-
2
-
-
82955235534
-
A review of RFID technology and its managerial applications in different industries
-
Xiaowei Zhu, Samar K. Mukhopadhyay, and Hisashi Kurata A review of RFID technology and its managerial applications in different industries Journal of Engineering and Technology Management 29 1 2012 152 167
-
(2012)
Journal of Engineering and Technology Management
, vol.29
, Issue.1
, pp. 152-167
-
-
Zhu, X.1
Mukhopadhyay, S.K.2
Kurata, H.3
-
3
-
-
84865691619
-
Intelligent fault prediction system based on internet of things
-
Xiaoli Xu, Tao Chen, and Mamoru Minami Intelligent fault prediction system based on internet of things Computers & Mathematics with Applications 64 5 2012 833 839
-
(2012)
Computers & Mathematics with Applications
, vol.64
, Issue.5
, pp. 833-839
-
-
Xu, X.1
Chen, T.2
Minami, M.3
-
4
-
-
84855467564
-
ACSP: A novel security protocol against counting attack for UHF RFID systems
-
Zhuzhong Qian, Ce Chen, Ilsun You, and Sanglu Lu ACSP: a novel security protocol against counting attack for UHF RFID systems Computers & Mathematics with Applications 63 2 2012 492 500
-
(2012)
Computers & Mathematics with Applications
, vol.63
, Issue.2
, pp. 492-500
-
-
Qian, Z.1
Chen, C.2
You, I.3
Lu, S.4
-
5
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
Chien Hung-Yu SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity IEEE Transactions on Dependable and Secure Computing 4 4 2007 337 340
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Hung-Yu, C.1
-
6
-
-
77953303552
-
Lightweight mutual authentication and ownership transfer for RFID systems
-
Lars Kulseng, Zhen Yu, Yawen Wei, Yong Guan, Lightweight mutual authentication and ownership transfer for RFID systems, in: Proceedings of IEEE INFOCOM 2010, pp. 1-5, 2010.
-
(2010)
Proceedings of IEEE INFOCOM 2010
, pp. 1-5
-
-
Kulseng, L.1
Yu, Z.2
Wei, Y.3
Guan, Y.4
-
7
-
-
78751647681
-
The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
-
Yu-Yi Chen, Meng-Lin Tsai, and Jinn-Ke Jan The design of RFID access control protocol using the strategy of indefinite-index and challenge-response Computer Communications 34 3 2011 250 256
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 250-256
-
-
Chen, Y.-Y.1
Tsai, M.-L.2
Jan, J.-K.3
-
8
-
-
78751649779
-
Improvement of the RFID authentication scheme based on quadratic residues
-
Tzu-Chang Yeh, Chien-Hung Wu, and Yuh-Min Tseng Improvement of the RFID authentication scheme based on quadratic residues Computer Communications 34 3 2011 337 341
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 337-341
-
-
Yeh, T.-C.1
Wu, C.-H.2
Tseng, Y.-M.3
-
9
-
-
78751648506
-
Defending RFID authentication protocols against DoS attacks
-
Dang Nguyen Duc, and Kwangjo Kim Defending RFID authentication protocols against DoS attacks Computer Communications 34 3 2011 384 390
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 384-390
-
-
Duc, D.N.1
Kim, K.2
-
10
-
-
85008055668
-
Secure and serverless RFID authentication and search protocols
-
Chiu Chiang Tan, Bo Sheng, and Qun Li Secure and serverless RFID authentication and search protocols IEEE Transactions on Wireless Communications 7 4 2008 1400 1407
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.4
, pp. 1400-1407
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
14
-
-
70450265312
-
Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI
-
Raphael C.-W. Phan Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI IEEE Transactions on Dependable and Secure Computing 6 4 2009 316 320
-
(2009)
IEEE Transactions on Dependable and Secure Computing
, vol.6
, Issue.4
, pp. 316-320
-
-
Phan, R.C.-W.1
-
15
-
-
34548162681
-
Vulnerability analysis of EMAP - An efficient RFID Mutual Authentication Protocol
-
Vienna, Austria, April 2007
-
Tieyan Li, Robert H. Deng, Vulnerability analysis of EMAP - an efficient RFID Mutual Authentication Protocol, in: Second International Conference on Availability, Reliability and Security-AReS 2007, Vienna, Austria, April 2007.
-
(2007)
Second International Conference on Availability, Reliability and Security-AReS
-
-
Li, T.1
Deng, R.H.2
-
16
-
-
58049161510
-
Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags
-
Vienna, Austria, September
-
Mihály Bárász, Balázs Boros, Péter Ligeti, Krisztina Lója, Dániel Nagy, Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags, in: First International EURASIP Workshop on RFID Technology, Vienna, Austria, September 2007.
-
(2007)
First International EURASIP Workshop on RFID Technology
-
-
Mihály Bárász, B.1
-
17
-
-
84919847449
-
Consideration on the Brute-force Attack Cost and Retrieval Cost: A Hash-based radio-frequency identification (RFID) Tag Mutual Authentication Protocol
-
Jung-Sik Cho, Young-Sik Jeong, and Sang Oh Park Consideration on the Brute-force Attack Cost and Retrieval Cost: a Hash-based radio-frequency identification (RFID) Tag Mutual Authentication Protocol Computers & Mathematics with Applications 2012
-
(2012)
Computers & Mathematics with Applications
-
-
Cho, J.-S.1
Jeong, Y.-S.2
Park, S.O.3
-
18
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
Ari Juels RFID security and privacy: a research survey Selected Areas in Communications 24 2 2006 381 394 (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
19
-
-
33847330246
-
A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks
-
Tassos Dimitriou, A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks, in: Proceedings of SecureComm'05, pp. 59-66, 2005.
-
(2005)
Proceedings of SecureComm'05
, pp. 59-66
-
-
Dimitriou, T.1
-
20
-
-
33749379761
-
Mutual Authentication Protocol for Low-cost RFID
-
Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren, Kwanjo Kim, Mutual Authentication Protocol for Low-cost RFID, in: Proceedings of the Workshop on RFID and Lightweight Cryptography, pp. 17-24, 2005.
-
(2005)
Proceedings of the Workshop on RFID and Lightweight Cryptography
, pp. 17-24
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
-
21
-
-
84857462261
-
Cryptanalysis of Cho et al.'s protocol, A hash-based mutual authentication protocol for RFID systems
-
Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri, and Majid Naderi Cryptanalysis of Cho et al.'s protocol, A hash-based mutual authentication protocol for RFID systems IACR Cryptology ePrint Archive 2011 2011 1 7
-
(2011)
IACR Cryptology EPrint Archive
, vol.2011
, pp. 1-7
-
-
Safkhani, M.1
Peris-Lopez, P.2
Hernández Castro, J.C.3
Bagheri, N.4
Naderi, M.5
-
22
-
-
84869783330
-
Desynchronization attack on hash-based RFID mutual authentication protocol
-
Hyunsung Kim Desynchronization attack on hash-based RFID mutual authentication protocol Journal of Security Engineering 9 4 2012 357 366
-
(2012)
Journal of Security Engineering
, vol.9
, Issue.4
, pp. 357-366
-
-
Kim, H.1
-
23
-
-
78751647847
-
Securing against Brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
-
Jung-Sik Cho, Sang-Soo Yeo, and Sung Kwon Kim Securing against Brute-force attack: a hash-based RFID mutual authentication protocol using a secret value Computer Communications 34 3 2011 391 397
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 391-397
-
-
Cho, J.-S.1
Yeo, S.-S.2
Kim, S.K.3
-
24
-
-
84869754446
-
Enhanced hash-based RFID mutual authentication protocol
-
Communications in Computer and Information Science
-
Hyunsung Kim Enhanced hash-based RFID mutual authentication protocol Computer Applications for Security, Control and System Engineering Communications in Computer and Information Science vol. 339 2012 70 77
-
(2012)
Computer Applications for Security, Control and System Engineering
, vol.339 VOL.
, pp. 70-77
-
-
Kim, H.1
|