-
1
-
-
77949553535
-
'Cryptanalysis of two RFID authentication protocols'
-
T. Cao and P. Shen, "Cryptanalysis of two RFID authentication protocols," International journal of network security, vol. 9, pp. 95-100, 2009.
-
(2009)
International journal of network security
, vol.9
, pp. 95-100
-
-
Cao, T.1
Shen, P.2
-
2
-
-
50249176295
-
'Maximalist cryptography and computation on the WISP UHF RFID Tag'
-
H. Chae, D. J. Yaeger, J. R. Smith, and K. Fu, "Maximalist cryptography and computation on the WISP UHF RFID Tag," in Proceedings of the International Conference on RFID Security, 2007.
-
(2007)
Proceedings of the International Conference on RFID Security
-
-
Chae, H.1
Yaeger, D.J.2
Smith, J.R.3
Fu, K.4
-
3
-
-
79953072900
-
'RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards'
-
C. L. Chen, Y. L. Lai, C. C. Chen, Y. Y. Deng, and Y. C. Hwang, "RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards," International Journal of Network Security, vol. 13, pp. 41-48, 2011.
-
(2011)
International Journal of Network Security
, vol.13
, pp. 41-48
-
-
Chen, C.L.1
Lai, Y.L.2
Chen, C.C.3
Deng, Y.Y.4
Hwang, Y.C.5
-
5
-
-
67349277179
-
'PAP: A privacy and authentication protocol for passive RFID tags'
-
A. X. Liu and L. A. Bailey, "PAP: A privacy and authentication protocol for passive RFID tags," Computer Communications, vol. 32, pp. 1194-1199, 2009.
-
(2009)
Computer Communications
, vol.32
, pp. 1194-1199
-
-
Liu, A.X.1
Bailey, L.A.2
-
6
-
-
84655161367
-
'Secure authentication scheme for passive C1G2 RFID tags'
-
M. Moessner and G. N. Khan, "Secure authentication scheme for passive C1G2 RFID tags," Computer Networks, vol. 56, pp. 273-286, 2012.
-
(2012)
Computer Networks
, vol.56
, pp. 273-286
-
-
Moessner, M.1
Khan, G.N.2
-
7
-
-
84858269835
-
'Reliable and low cost RFID based authentication system for large scale deployment'
-
M. Naveed, W. Habib, U. Masud, U. Ullah, and G. Ahmad, "Reliable and low cost RFID based authentication system for large scale deployment," International Journal of Network Security, vol. 14, pp. 173-179, 2012.
-
(2012)
International Journal of Network Security
, vol.14
, pp. 173-179
-
-
Naveed, M.1
Habib, W.2
Masud, U.3
Ullah, U.4
Ahmad, G.5
-
8
-
-
67649484364
-
'A Gen2-based RFID authentication protocol for security and privacy'
-
Aug. 2009
-
H. M. Sun and W. C. Ting, "A Gen2-based RFID authentication protocol for security and privacy," IEEE Transactions on Mobile Computing, vol. 8, pp. 1052-1062, Aug. 2009 2009.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, pp. 1052-1062
-
-
Sun, H.M.1
Ting, W.C.2
-
9
-
-
79956297141
-
'An authentication protocol for low-cost RFID tags'
-
C. H. Wei, M. S. Hwang, and A. Y. H. Chin, "An authentication protocol for low-cost RFID tags," International Journal of Mobile Communications, vol. 9, pp. 208-223, 2011.
-
(2011)
International Journal of Mobile Communications
, vol.9
, pp. 208-223
-
-
Wei, C.H.1
Hwang, M.S.2
Chin, A.Y.H.3
-
10
-
-
79953083437
-
'A mutual authentication protocol for RFID'
-
C. H. Wei, M. S. Hwang, and A. Y. H. Chin, "A mutual authentication protocol for RFID," IT Professional, vol. 13, pp. 20-24, 2011.
-
(2011)
IT Professional
, vol.13
, pp. 20-24
-
-
Wei, C.H.1
Hwang, M.S.2
Chin, A.Y.H.3
-
11
-
-
84866074525
-
'An improved authentication protocol for mobile agent device in RFID environment'
-
C. H. Wei, M. S. Hwang, and A. Y. H. Chin, "An improved authentication protocol for mobile agent device in RFID environment," International Journal of Mobile Communications, vol. 10, pp. 508-520, 2012.
-
(2012)
International Journal of Mobile Communications
, vol.10
, pp. 508-520
-
-
Wei, C.H.1
Hwang, M.S.2
Chin, A.Y.H.3
|