-
1
-
-
80955160447
-
That 'Internet of Things' thing
-
(retrieved 08.04.11)
-
Kevin Ashton That 'Internet of Things' thing RFID J. 22 July 2009 < http://www.rfidjournal.com/article/view/4986 > (retrieved 08.04.11)
-
(2009)
RFID J.
, Issue.22 JULY
-
-
Ashton, K.1
-
2
-
-
84883738042
-
Security assessment of EPCglobal architecture framework
-
Divyan M. Konidala, W.-S. Kim, and K. Kim Security assessment of EPCglobal architecture framework AUTO-ID Labs 2006 13 16
-
(2006)
RFID J.
, pp. 13-16
-
-
Konidala, D.M.1
Kim, W.-S.2
Kim, K.3
-
3
-
-
80052496445
-
Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers
-
Rolando Trujillo-Rasua, and Agusti Solanas Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers Comput. Netw. 55 15 2011 3211 3223
-
(2011)
Comput. Netw.
, vol.55
, Issue.15
, pp. 3211-3223
-
-
Trujillo-Rasua, R.1
Solanas, A.2
-
5
-
-
79151469014
-
Scalable RFID security protocols supporting tag ownership transfer
-
B. Song, and C.J. Mitchell Scalable RFID security protocols supporting tag ownership transfer Comput. Commun. 34 4 2011 556 566
-
(2011)
Comput. Commun.
, vol.34
, Issue.4
, pp. 556-566
-
-
Song, B.1
Mitchell, C.J.2
-
6
-
-
84860888306
-
Security flaws in a recent RFID delegation protocol
-
(11)
-
I. Erguler, and E. Anarim Security flaws in a recent RFID delegation protocol Personal Ubiquitous Comput. 16 3 2012 337 349 (11)
-
(2012)
Personal Ubiquitous Comput.
, vol.16
, Issue.3
, pp. 337-349
-
-
Erguler, I.1
Anarim, E.2
-
7
-
-
84862295856
-
Predictive protocol for the scalable identification of RFID tags through collaborative readers
-
Rolando Trujillo-Rasua, Agusti Solanas, Pablo A. Pérez- Martínez, and Josep Domingo-Ferre Predictive protocol for the scalable identification of RFID tags through collaborative readers Comput. Ind. 63 6 2012 557 573
-
(2012)
Comput. Ind.
, vol.63
, Issue.6
, pp. 557-573
-
-
Trujillo-Rasua, R.1
Solanas, A.2
Pérez-Martínez, P.A.3
Domingo-Ferre, J.4
-
9
-
-
84899109808
-
-
EPCglobal. (retrieved 12.04.12)
-
EPCglobal. < http://www.gs1.org/gsmp/kc/epcglobal > (retrieved 12.04.12).
-
-
-
-
10
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
V. Atluri, B. Pfitzmann, P.D. McDaniel (Eds.) ACM. Washington, DC, USA, ACM Press
-
D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, in: V. Atluri, B. Pfitzmann, P.D. McDaniel (Eds.), Conference on Computer and Communications Security - ACM CCS'04, ACM. Washington, DC, USA, ACM Press, 2004, pp. 210-219.
-
(2004)
Conference on Computer and Communications Security - ACM CCS'04
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
11
-
-
70249136217
-
Scalable privacy protecting scheme through distributed rfid tag identification
-
ser. AIPACa '08, ACM, New York, NY, USA
-
S. Fouladgar, H. Afifi, Scalable privacy protecting scheme through distributed rfid tag identification, in: Proceedings of the Workshop on Applications of Private and Anonymous Communications, ser. AIPACa '08, ACM, New York, NY, USA, 2008, pp. 31-38. < http://doi.acm.org/10.1145/1461464.1461467 >.
-
(2008)
Proceedings of the Workshop on Applications of Private and Anonymous Communications
, pp. 31-38
-
-
Fouladgar, S.1
Afifi, H.2
-
12
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
Security
-
Dirk Henrici, Paul MÄuller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: IEEE International Workshop on Pervasive Computing and Communication, Security, 2004, pp. 149-153.
-
(2004)
IEEE International Workshop on Pervasive Computing and Communication
, pp. 149-153
-
-
Dirk Henrici, P.1
-
13
-
-
51349094869
-
Recovering and restoring tampered RFID data using steganographic principles
-
2006, ICIT 2006
-
M. Mohan, V. Potdar, E. Chang, Recovering and restoring tampered RFID data using steganographic principles, in: IEEE International Conference on Industrial Technology, 2006, ICIT 2006, 2006, pp. 2853-2859.
-
(2006)
IEEE International Conference on Industrial Technology
, pp. 2853-2859
-
-
Mohan, M.1
Potdar, V.2
Chang, E.3
-
14
-
-
24644501824
-
-
D. Hutter, M. Ullmann, Springer Berlin/Heidelberg
-
K. Rhee, J. Kwak, S. Kim, and D. Won D. Hutter, M. Ullmann, Challenge-Response based RFID Authentication Protocol for Distributed Database Environment Security in Pervasive Computing vol. 3450 2005 Springer Berlin/Heidelberg 70 84
-
(2005)
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment Security in Pervasive Computing
, vol.3450 VOL.
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
15
-
-
34247465966
-
A distributed architecture for scalable private RFID tag identification
-
A. Solanas, J. Domingo-Ferrer, A. Martínez-Ballesté, and V. Daza A distributed architecture for scalable private RFID tag identification Comput. Netw. 51 9 2007 2268 2279
-
(2007)
Comput. Netw.
, vol.51
, Issue.9
, pp. 2268-2279
-
-
Solanas, A.1
Domingo-Ferrer, J.2
Martínez-Ballesté, A.3
Daza, V.4
-
16
-
-
82155182017
-
Scalable trajectory-based protocol for RFID tags identification
-
Rolando Trujillo-Rasua, and Agusti Solanas Scalable trajectory-based protocol for RFID tags identification RFID-TA 2011 2011 279 285
-
(2011)
RFID-TA
, vol.2011
, pp. 279-285
-
-
Trujillo-Rasua, R.1
Solanas, A.2
-
17
-
-
33947515842
-
Reducing time complexity in RFID systems
-
Gildas Avoine, Etienne Dysli, and Philippe Oechslin Reducing time complexity in RFID systems Sel. Areas Cryptogr. 2005 2005 291 306
-
(2005)
Sel. Areas Cryptogr.
, vol.2005
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
18
-
-
47749092385
-
Group-based private authentication
-
G. Avoine, L. Buttyant, T. Holczer, I. Vajda, Group-based private authentication, in: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007, pp. 1-6.
-
(2007)
IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks
, pp. 1-6
-
-
Avoine, G.1
Buttyant, L.2
Holczer, T.3
Vajda, I.4
-
24
-
-
84872677398
-
SQLIA detection and prevention approach for RFID systems
-
J. Abawajy SQLIA detection and prevention approach for RFID systems J. Syst. Softw. 86 3 2013 751 758
-
(2013)
J. Syst. Softw.
, vol.86
, Issue.3
, pp. 751-758
-
-
Abawajy, J.1
-
25
-
-
81255138613
-
Smart RFID reader protocol for malware detection
-
B. Ray, S. Huda, M.U. Chowdhury, Smart RFID reader protocol for malware detection, in: 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2011, pp. 64-69.
-
(2011)
12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
, pp. 64-69
-
-
Ray, B.1
Huda, S.2
Chowdhury, M.U.3
-
26
-
-
84899058411
-
-
The Internet Engineering Task Force (IETF), RFC2244, (retrieved 08.04.12)
-
The Internet Engineering Task Force (IETF), RFC2244, < http://tools.ietf.org/html/rfc2244#section-1.2 > (retrieved 08.04.12).
-
-
-
-
27
-
-
3843081053
-
A statistical test suite for random and pseudorandom number generators
-
A. Rukhin, and J. Soto et al. A statistical test suite for random and pseudorandom number generators NIST Spec. Publ. 2000 800 822
-
(2000)
NIST Spec. Publ.
, pp. 800-822
-
-
Rukhin, A.1
Soto, J.2
-
29
-
-
82155188741
-
Studying the pseudo random number generator of a low-cost RFID tag
-
M. Merhi, J.C. Hernandez-Castro, P. Peris-Lopez, Studying the pseudo random number generator of a low-cost RFID tag, in: IEEE International Conference on RFID-Technologies and Applications (RFID-TA), 2011, pp. 381-385.
-
(2011)
IEEE International Conference on RFID-Technologies and Applications (RFID-TA)
, pp. 381-385
-
-
Merhi, M.1
Hernandez-Castro, J.C.2
Peris-Lopez, P.3
-
30
-
-
33845455482
-
-
R. Meersman, Z. Tari, P. Herrero (Eds.), On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Springer, Berlin Heidelberg
-
P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, A. Ribagorda, EMAP: an efficient mutual-authentication protocol for low-cost RFID tags, in: R. Meersman, Z. Tari, P. Herrero (Eds.), On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Springer, Berlin Heidelberg, vol. 4277, 2006, pp. 352-361.
-
(2006)
EMAP: An efficient mutual-authentication protocol for low-cost RFID tags
, vol.4277
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
31
-
-
36248971663
-
LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags
-
Pedro Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Ribagorda, LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags, in: Handbook of RFIDSec'06, 2006.
-
(2006)
Handbook of RFIDSec'06
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
32
-
-
84899076722
-
-
National Institute of Standard and Technology. (retrieved 07.03.11)
-
National Institute of Standard and Technology. < http://csrc.nist.gov/ groups/ST/toolkit/rng/documentation-software.html > (retrieved 07.03.11).
-
-
-
-
35
-
-
84899064479
-
-
University of Washington's Lahar Project. (retrieved 08.04.11)
-
University of Washington's Lahar Project. < http://lahar.cs. washington.edu/displayPage.php?path=./content/Download/RFIDData/rfidData.html > (retrieved 08.04.11).
-
-
-
-
36
-
-
84899107900
-
-
EPC Global. (retrieved 20.11.12)
-
EPC Global. < http://www.gs1.org/gsmp/kc/epcglobal/tds/tds-1-6- RatifiedStd-20110922.pdf > (retrieved 20.11.12).
-
-
-
|