-
1
-
-
33144457479
-
RFID security and privacy: a research survey
-
Juels, A., RFID security and privacy: a research survey. IEEE J. Sel Areas Commun 24:381–394, 2006.
-
(2006)
IEEE J. Sel Areas Commun
, vol.24
, pp. 381-394
-
-
Juels, A.1
-
2
-
-
33749658430
-
RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital
-
Wang, S. W., Chen, W. H., Ong, C. S., Liu, L., and Chuang, Y. W., RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital. In: Hawaii International Conference on System Sciences. IEEE, pp. 184–194, 2006.
-
(2006)
Hawaii International Conference on System Sciences. IEEE
, pp. 184-194
-
-
Wang, S.W.1
Chen, W.H.2
Ong, C.S.3
Liu, L.4
Chuang, Y.W.5
-
3
-
-
79952440568
-
Real-time location and inpatient care systems based on passive RFID
-
Najera, P., Lopez, J., and Roman, R., Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3):980–989, 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.3
, pp. 980-989
-
-
Najera, P.1
Lopez, J.2
Roman, R.3
-
5
-
-
57549090091
-
Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology
-
Katz, J. E., and Rice, R. E., Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. Int. J. Med. Inform. 78(2):104–114, 2009.
-
(2009)
Int. J. Med. Inform.
, vol.78
, Issue.2
, pp. 104-114
-
-
Katz, J.E.1
Rice, R.E.2
-
6
-
-
84922424994
-
-
The benefit analysis of RFID use in the health management center—the experience in Shin Kong Wu Ho-Su Memorial Hospital: National Taiwan University
-
Leu, J. G., The benefit analysis of RFID use in the health management center—the experience in Shin Kong Wu Ho-Su Memorial Hospital: National Taiwan University, 2010.
-
(2010)
G.
-
-
Leu, J.1
-
7
-
-
70350710817
-
RFID-based operation room and medicare system for patient safety enhancement—a case study of keelung branch
-
Yu, C., Chen, C., Liao, P., and Lee, Y., RFID-based operation room and medicare system for patient safety enhancement—a case study of keelung branch. J. Inf. Manag. 15:97–122, 2008.
-
(2008)
J. Inf. Manag.
, vol.15
, pp. 97-122
-
-
Yu, C.1
Chen, C.2
Liao, P.3
Lee, Y.4
-
8
-
-
18744409344
-
The blocker tag: selective blocking of rfid tags for consumer privacy
-
Juels, A., Rivest, R. L., and Szudlo, M., The blocker tag: selective blocking of rfid tags for consumer privacy. The 8th ACM Conference on Computer and Communications Security, 103–111, 2003.
-
(2003)
The 8th ACM Conference on Computer and Communications Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szudlo, M.3
-
9
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing - SPC 2003
-
Weis, S. A., Sarma, S. E., Rivest, R. L., and Engles, D. W., Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing - SPC 2003, Springer-Verlag. 2802:201–212, 2003.
-
(2003)
Springer-Verlag
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engles, D.W.4
-
10
-
-
84939907773
-
-
Cryptographic approach to privacy friendly tags, RFID Privacy Workshop:
-
Okhubo, M., Suzuki, K., and Kinoshita, S., Cryptographic approach to privacy friendly tags. RFID Privacy Workshop, 2003.
-
(2003)
and Kinoshita, S.
-
-
Okhubo, M.1
Suzuki, K.2
-
11
-
-
2942625823
-
Hash based enhancement of location privacy for radio frequency identification devices using varying identifiers. International Workshop on Pervasive Computing and Communication Security—PerSec 2004
-
Henrici, D., and Muller, P., Hash based enhancement of location privacy for radio frequency identification devices using varying identifiers. International Workshop on Pervasive Computing and Communication Security—PerSec 2004, IEEE Computer Society, 149–153, 2004.
-
(2004)
IEEE Computer Society
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
12
-
-
84977783611
-
Strong and robust rfid authentication enabling perfect ownership transfer. Information and Communications Security, Lecture Notes in Computer Science
-
Lim, C., and Kwon, T., Strong and robust rfid authentication enabling perfect ownership transfer. Information and Communications Security, Lecture Notes in Computer Science, Springer, 4307:1–20, 2006.
-
(2006)
Springer
, vol.4307
, pp. 1-20
-
-
Lim, C.1
Kwon, T.2
-
13
-
-
33845455482
-
EMAP, an efficient mutual authentication protocol for low cost rfid tags
-
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A., EMAP, an efficient mutual authentication protocol for low cost rfid tags. In: Proc. of IS’06: Springer Verlag. 4277:352–361, 2006.
-
(2006)
Proc. of IS’06: Springer Verlag. 4277:352–361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
14
-
-
84939907775
-
-
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A. LMAP: a real lightweight authentication protocol for low cost rfid tags. In Hand of Workshop on RFID and Lightweight Crypto, 2006
-
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A. LMAP: a real lightweight authentication protocol for low cost rfid tags. In Hand of Workshop on RFID and Lightweight Crypto, 2006.
-
-
-
-
15
-
-
33750067948
-
M2AP, A minimalist mutual authentication protocol for low cost rfid tags
-
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A., M2AP, A minimalist mutual authentication protocol for low cost rfid tags. In: Proc. of UIC’06: Springer Verlag. 4159:912–923, 2006.
-
(2006)
Proc. of UIC’06: Springer Verlag. 4159:912–923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
16
-
-
36248982045
-
SAS1: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity
-
Chien, H. Y., SAS1: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4):337–340, 2007.
-
(2007)
IEEE Trans. Dependable Secure Comput.
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.Y.1
-
17
-
-
2942560605
-
A., “yoking proofs” for rfid tags. First International Workshop on Pervasive Computing and Communication Security
-
Juels, A., “yoking proofs” for rfid tags. First International Workshop on Pervasive Computing and Communication Security, IEEE Computer Society, 138–143, 2004.
-
(2004)
IEEE Computer Society
, pp. 138-143
-
-
-
18
-
-
18944380407
-
Surgichip—new technology for prevensions of wrong site, wrong procedure, wrong person surgery
-
Sandlin, D., Surgichip—new technology for prevensions of wrong site, wrong procedure, wrong person surgery. J. Perianesth Nurs. 20(2):144–146, 2005.
-
(2005)
J. Perianesth Nurs.
, vol.20
, Issue.2
, pp. 144-146
-
-
Sandlin, D.1
-
19
-
-
77953859589
-
The application of rfid on drug safety of inpatient nursing healthcare
-
Wu, F., Kuo, F., and Liu, L. W., The application of rfid on drug safety of inpatient nursing healthcare. ICEC’05 Proceedings of the 7th international conference on Electronic commerce, 85–92, 2005.
-
(2005)
ICEC’05 Proceedings of the 7th international conference on Electronic commerce
, pp. 85-92
-
-
Wu, F.1
Kuo, F.2
Liu, L.W.3
-
20
-
-
49949152652
-
A new method to guard inpatient medication safety by the implementation of rfid
-
Sun, P. R., Wang, B. H., and Wu, F., A new method to guard inpatient medication safety by the implementation of rfid. J. Med. Syst. 32(4):327–332, 2008.
-
(2008)
J. Med. Syst.
, vol.32
, Issue.4
, pp. 327-332
-
-
Sun, P.R.1
Wang, B.H.2
Wu, F.3
-
21
-
-
77955537415
-
Anonymous coexistence proofs for rfid tags
-
Lo, N. W., and Yeh, K. H., Anonymous coexistence proofs for rfid tags. J. Inf. Sci. Eng. 26(4):1213–1230, 2010.
-
(2010)
J. Inf. Sci. Eng.
, vol.26
, Issue.4
, pp. 1213-1230
-
-
Lo, N.W.1
Yeh, K.H.2
-
22
-
-
36248971663
-
LMAP: a real lightweight authentication protocol for low cost rfid tags
-
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A., LMAP: a real lightweight authentication protocol for low cost rfid tags. In: Hand of Workshop on RFID and Lightweight Crypto, 2006.
-
(2006)
Hand of Workshop on RFID and Lightweight Crypto
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
23
-
-
46749130059
-
A novel mutual authentication scheme based on quadratic residues for RFID systems
-
Chen, Y., Chou, J. S., and Sun, H. M., A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput. Netw. 52(12):2373–2380, 2008.
-
(2008)
Comput. Netw.
, vol.52
, Issue.12
, pp. 2373-2380
-
-
Chen, Y.1
Chou, J.S.2
Sun, H.M.3
-
24
-
-
78751649779
-
Improvement of the RFID authentication scheme based on quadratic residues
-
Yeh, T. C., Wu, C. H., and Tseng, Y. M., Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 34(3):337–341, 2011.
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 337-341
-
-
Yeh, T.C.1
Wu, C.H.2
Tseng, Y.M.3
-
25
-
-
84870065586
-
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
-
Doss, R., Sundaresan, S., and Zhou, W., A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11(1):383–396, 2013.
-
(2013)
Ad Hoc Netw.
, vol.11
, Issue.1
, pp. 383-396
-
-
Doss, R.1
Sundaresan, S.2
Zhou, W.3
-
26
-
-
33745654539
-
RFID-tags for anti-counterfeiting
-
Tuyls, P., and Batina, L., RFID-tags for anti-counterfeiting. Lect. Notes Comput. Sci 3860:115–131, 2006.
-
(2006)
Lect. Notes Comput. Sci
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
27
-
-
34547688845
-
Public-key cryptography for RFID-tags
-
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., and Verbauwhede, I., Public-key cryptography for RFID-tags. In: Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 217–222, 2007.
-
(2007)
Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
28
-
-
49049105964
-
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol
-
Lee, Y. K., Batina, L., and Verbauwhede, I., EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol, IEEE International Conference on RFID, pp. 97–104, 2008.
-
(2008)
IEEE International Conference on RFID
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
29
-
-
58449108568
-
Cryptanalysis of EC-RAC, a RFID identification protocol
-
Lecture Notes in Computer Science: Springer-Verlag
-
Bringer, J., Chabanne, H., and Icart, T., Cryptanalysis of EC-RAC, a RFID identification protocol. In: International Conference on Cryptology and Network Security—CANS’08, Lecture Notes in Computer Science: Springer-Verlag, 2008.
-
International Conference on Cryptology and Network Security—CANS’08
, pp. 2008
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
31
-
-
84864058187
-
A More Secure Authentication Scheme for Telecare Medicine Information Systems
-
He, D., Chen, J., and Zhang, R., A More Secure Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 36(3):1989–1995, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
32
-
-
84863989374
-
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
-
He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3):1149–1157, 2012.
-
(2012)
Nonlinear Dyn.
, vol.69
, Issue.3
, pp. 1149-1157
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
33
-
-
84872265840
-
-
Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems
-
Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. doi: 10.1007/s10916-012-9919-y, 2013.
-
-
-
-
34
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
-
35
-
-
84893021026
-
An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem
-
Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):13, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.2
, pp. 13
-
-
Zhao, Z.1
|