-
1
-
-
67349277179
-
PAP: A privacy and authentication protocol for passive RFID tags
-
Liu AX, Bailey LA (2009) PAP: a privacy and authentication protocol for passive RFID tags. Comput Commun 32(7):1194-1199
-
(2009)
Comput Commun
, vol.32
, Issue.7
, pp. 1194-1199
-
-
Liu, A.X.1
Bailey, L.A.2
-
2
-
-
84907591029
-
-
EasyCard. http://www.easycard.com.tw/
-
-
-
EasyCard1
-
3
-
-
77956872484
-
REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks
-
Lin X, Lu R, Kwan D, Shen XS (2010) REACT: an RFID-based privacy-preserving children tracking scheme for large amusement parks. Comput Netw 54(15):2744-2755
-
(2010)
Comput Netw
, vol.54
, Issue.15
, pp. 2744-2755
-
-
Lin, X.1
Lu, R.2
Kwan, D.3
Shen, X.S.4
-
4
-
-
53749094694
-
Public key cryptography based privacy preserving multi-context RFID infrastructure
-
Kaya SV, Sava E, Levi A, Erçetin Ö (2009) Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Netw 7(1):136-152
-
(2009)
Ad Hoc Netw
, vol.7
, Issue.1
, pp. 136-152
-
-
Kaya, S.V.1
Sava, E.2
Levi, A.3
Erçetin Ö.4
-
5
-
-
64249137046
-
A hybrid approach for privacy-preserving RFID tags
-
Ryu EK, Takagi T (2009) A hybrid approach for privacy-preserving RFID tags. Comput Stand Interfaces 31(4):812-815
-
(2009)
Comput Stand Interfaces
, vol.31
, Issue.4
, pp. 812-815
-
-
Ryu, E.K.1
Takagi, T.2
-
6
-
-
78751647847
-
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
-
Cho JS, Yeo SS, Kim SK (2011) Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput Commun 34(3):391-397
-
(2011)
Comput Commun
, vol.34
, Issue.3
, pp. 391-397
-
-
Cho, J.S.1
Yeo, S.S.2
Kim, S.K.3
-
7
-
-
49049105769
-
Design and implementation of PUF-based
-
Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V (2008) Design and implementation of PUF-based. In: 2008 IEEE international conference on RFID. IEEE, pp 58-64
-
(2008)
2008 IEEE International Conference on RFID. IEEE
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
9
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Springer, Berlin
-
Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Security in pervasive computing. Springer, Berlin, pp 201-212
-
(2004)
Security in Pervasive Computing
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
10
-
-
78751649779
-
Improvement of the RFID authentication scheme based on quadratic residues
-
Yeh TC, Wu CH, Tseng YM (2011) Improvement of the RFID authentication scheme based on quadratic residues. Comput Commun 34(3):337-341
-
(2011)
Comput Commun
, vol.34
, Issue.3
, pp. 337-341
-
-
Yeh, T.C.1
Wu, C.H.2
Tseng, Y.M.3
-
11
-
-
84989949883
-
Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware
-
Lee YK, Batina L, Singelee D, Preneel B, Verbauwhede I (2010) Anti-counterfeiting, untraceability and other security challenges for RFID systems: public-key-based protocols and hardware. In: Towards hardware-intrinsic security. Springer, Berlin, pp 237-257
-
(2010)
Towards Hardware-intrinsic Security. Springer, Berlin
, pp. 237-257
-
-
Lee, Y.K.1
Batina, L.2
Singelee, D.3
Preneel, B.4
Verbauwhede, I.5
-
14
-
-
38049040624
-
Secure active RFID tag system
-
Yamada I, Shiotsu S, Itasaki A, Inano S, Yasaki K, Takenaka M (2005) Secure active RFID tag system. In: Proceedings of Ubicomp 2005 workshop
-
(2005)
Proceedings of Ubicomp 2005 Workshop
-
-
Yamada, I.1
Shiotsu, S.2
Itasaki, A.3
Inano, S.4
Yasaki, K.5
Takenaka, M.6
-
15
-
-
84907593109
-
Privacy enhanced active RFID tag
-
Kinoshita S, Ohkubo M, Hoshino F, Morohashi G, Shionoiri O, Kanai A (2005) Privacy enhanced active RFID tag. Cognit Sci Res Paper Univ Sussex CSRP 577:100
-
(2005)
Cognit Sci Res Paper Univ Sussex CSRP
, vol.577
, pp. 100
-
-
Kinoshita, S.1
Ohkubo, M.2
Hoshino, F.3
Morohashi, G.4
Shionoiri, O.5
Kanai, A.6
-
16
-
-
34247264920
-
Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security
-
Kim HW, Lim SY, Lee HJ (2006) Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. In: Hybrid information technology. International conference on ICHIT'06, IEEE, vol 2, pp 718-723
-
(2006)
Hybrid Information Technology. International Conference on ICHIT'06, IEEE
, vol.2
, pp. 718-723
-
-
Kim, H.W.1
Lim, S.Y.2
Lee, H.J.3
-
18
-
-
80053220372
-
Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems
-
2865742
-
Ning H, Liu H, Mao J, Zhang Y (2011) Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Commun 5(12):1755-1768
-
(2011)
IET Commun
, vol.5
, Issue.12
, pp. 1755-1768
-
-
Ning, H.1
Liu, H.2
Mao, J.3
Zhang, Y.4
-
19
-
-
34547688845
-
Public-key cryptography for RFID-tags
-
Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P, Verbauwhede I (2007) Public-key cryptography for RFID-tags. In: Pervasive computing and communications workshops, 2007. Fifth annual IEEE international conference on PerCom workshops' 07. IEEE, pp 217-222
-
(2007)
Pervasive Computing and Communications Workshops, 2007. Fifth Annual IEEE International Conference on PerCom Workshops' 07. IEEE
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
20
-
-
34548815120
-
Are standards compliant elliptic curve cryptosystems feasible on RFID
-
Kumar S, Paar C (2006) Are standards compliant elliptic curve cryptosystems feasible on RFID. In: Workshop on RFID security, pp 12-14
-
(2006)
Workshop on RFID Security
, pp. 12-14
-
-
Kumar, S.1
Paar, C.2
-
24
-
-
60649097378
-
Low-power hardware implementation of ECC processor suitable for low-cost RFID tags
-
Luo P, Wang X, Feng J, Xu Y (2008) Low-power hardware implementation of ECC processor suitable for low-cost RFID tags. In: 9th international conference on solid-state and integrated-circuit technology, 2008. ICSICT 2008. IEEE, pp 1681-1684
-
(2008)
9th International Conference on Solid-state and Integrated-circuit Technology, 2008. ICSICT 2008. IEEE
, pp. 1681-1684
-
-
Luo, P.1
Wang, X.2
Feng, J.3
Xu, Y.4
-
26
-
-
77957684720
-
Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations
-
Godor G, Giczi N, Imre S (2010) Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In: IEEE international conference on wireless communications, networking and information security (WCNIS), 2010. IEEE, pp 650-657
-
(2010)
IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010. IEEE
, pp. 650-657
-
-
Godor, G.1
Giczi, N.2
Imre, S.3
-
27
-
-
75649122972
-
Low-cost digital signature architecture suitable for radio frequency identification tags
-
O'Neill M, Robshaw MJ (2010) Low-cost digital signature architecture suitable for radio frequency identification tags. Comput Digital Tech IET 4(1):14-26
-
(2010)
Comput Digital Tech IET
, vol.4
, Issue.1
, pp. 14-26
-
-
O'Neill, M.1
Robshaw, M.J.2
-
28
-
-
80054889210
-
An improvement of privacy-preserving ECC-based grouping proof for RFID
-
Ko WT, Chiou SY, Lu EH, Chang HC (2011) An improvement of privacy-preserving ECC-based grouping proof for RFID. In: Cross strait quad-regional radio science and wireless technology conference (CSQRWC), 2011, vol 2. IEEE, pp 1062-1064
-
(2011)
Cross Strait Quad-regional Radio Science and Wireless Technology Conference (CSQRWC), 2011, Vol 2. IEEE
, pp. 1062-1064
-
-
Ko, W.T.1
Chiou, S.Y.2
Lu, E.H.3
Chang, H.C.4
-
29
-
-
80052239373
-
Formation of elliptic curve using finger print for network security
-
Nathan BT, Meenakumari R, Usha S (2011) Formation of elliptic curve using finger print for network security. In: International conference on process automation, control and computing (PACC), 2011. IEEE, pp 1-5
-
(2011)
International Conference on Process Automation, Control and Computing (PACC), 2011. IEEE
, pp. 1-5
-
-
Nathan, B.T.1
Meenakumari, R.2
Usha, S.3
-
30
-
-
80455155201
-
Zero-knowledge authentication protocol based on alternative mode in RFID systems
-
2865742
-
Liu H, Ning H (2011) Zero-knowledge authentication protocol based on alternative mode in RFID systems. IEEE Sensors J 11(12):3235-3245
-
(2011)
IEEE Sensors J
, vol.11
, Issue.12
, pp. 3235-3245
-
-
Liu, H.1
Ning, H.2
-
32
-
-
84878482413
-
Grouping-proofs based authentication protocol for distributed RFID systems
-
Liu H, Ning H, Zhang Y, He D, Xiong Q, Yang LT (2012) Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Trans Parallel Distrib Syst 24(7):1321-1330
-
(2012)
IEEE Trans Parallel Distrib Syst
, vol.24
, Issue.7
, pp. 1321-1330
-
-
Liu, H.1
Ning, H.2
Zhang, Y.3
He, D.4
Xiong, Q.5
Yang, L.T.6
-
36
-
-
37349114566
-
E-passport threats
-
Vaudenay S (2007) E-passport threats. IEEE Secur Privacy 5(6):61-64
-
(2007)
IEEE Secur Privacy
, vol.5
, Issue.6
, pp. 61-64
-
-
Vaudenay, S.1
-
39
-
-
57049150751
-
A study on secure RFID mutual authentication scheme in pervasive computing environment
-
Kang SY, Lee DG, Lee IY (2008) A study on secure RFID mutual authentication scheme in pervasive computing environment. Comput Commun 31(18):4248-4254
-
(2008)
Comput Commun
, vol.31
, Issue.18
, pp. 4248-4254
-
-
Kang, S.Y.1
Lee, D.G.2
Lee, I.Y.3
-
40
-
-
84863515660
-
Scalable RFID systems: A privacy-preserving protocol with constant-time identification
-
Alomair B, Clark A, Cuellar J, Poovendran R (2012) Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Trans Parallel Distrib Syst 23(8):1536-1550
-
(2012)
IEEE Trans Parallel Distrib Syst
, vol.23
, Issue.8
, pp. 1536-1550
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
41
-
-
78049383154
-
Privacy versus scalability in radio frequency identification systems
-
Alomair B, Poovendran R (2010) Privacy versus scalability in radio frequency identification systems. Comput Commun 33(18):2155-2163
-
(2010)
Comput Commun
, vol.33
, Issue.18
, pp. 2155-2163
-
-
Alomair, B.1
Poovendran, R.2
-
42
-
-
79151469014
-
Scalable RFID security protocols supporting tag ownership transfer
-
Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34(4):556-566
-
(2011)
Comput Commun
, vol.34
, Issue.4
, pp. 556-566
-
-
Song, B.1
Mitchell, C.J.2
-
43
-
-
84870065586
-
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
-
Doss R, Sundaresan S, Zhou W (2012) A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw 1(1):383-396
-
(2012)
Ad Hoc Netw
, vol.1
, Issue.1
, pp. 383-396
-
-
Doss, R.1
Sundaresan, S.2
Zhou, W.3
-
44
-
-
84655161367
-
Secure authentication scheme for passive C1G2 RFID tags
-
Moessner M, Khan GN (2012) Secure authentication scheme for passive C1G2 RFID tags. Comput Netw 56(1):273-286
-
(2012)
Comput Netw
, vol.56
, Issue.1
, pp. 273-286
-
-
Moessner, M.1
Khan, G.N.2
-
45
-
-
84865741288
-
A minimum disclosure approach to authentication and privacy in RFID systems
-
Doss R, Zhou W, Sundaresan S, Yu S, Gao L (2012) A minimum disclosure approach to authentication and privacy in RFID systems. Comput Netw 56(15):3401-3416
-
(2012)
Comput Netw
, vol.56
, Issue.15
, pp. 3401-3416
-
-
Doss, R.1
Zhou, W.2
Sundaresan, S.3
Yu, S.4
Gao, L.5
-
46
-
-
78751648506
-
Defending RFID authentication protocols against DoS attacks
-
Duc DN, Kim K (2011) Defending RFID authentication protocols against DoS attacks. Comput Commun 34(3):384-390
-
(2011)
Comput Commun
, vol.34
, Issue.3
, pp. 384-390
-
-
Duc, D.N.1
Kim, K.2
-
47
-
-
84891359925
-
-
EPCglobal. http://www.epcglobalinc.org
-
EPCglobal
-
-
-
49
-
-
76849106311
-
Universally composable RFID identification and authentication protocols
-
Burmester M, Van Le T, De Medeiros B, Tsudik G (2009) Universally composable RFID identification and authentication protocols. ACM Trans Inf Syst Secur (TISSEC) 12(4):21
-
(2009)
ACM Trans Inf Syst Secur (TISSEC)
, vol.12
, Issue.4
, pp. 21
-
-
Burmester, M.1
Van Le, T.2
De Medeiros, B.3
Tsudik, G.4
-
50
-
-
77957851534
-
Securing RFID systems conforming to EPC class 1 generation 2 standard
-
Yeh TC, Wang YJ, Kuo TC, Wang SS (2010) Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst Appl 37(12):7678-7683
-
(2010)
Expert Syst Appl
, vol.37
, Issue.12
, pp. 7678-7683
-
-
Yeh, T.C.1
Wang, Y.J.2
Kuo, T.C.3
Wang, S.S.4
-
51
-
-
81855161588
-
Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard
-
Yoon EJ (2012) Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst Appl 39(1):1589-1594
-
(2012)
Expert Syst Appl
, vol.39
, Issue.1
, pp. 1589-1594
-
-
Yoon, E.J.1
-
52
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
3227926
-
Chien HY (2007) SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Depend Secure Comput 4(4):337-340
-
(2007)
IEEE Trans Depend Secure Comput
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.Y.1
-
53
-
-
70450265312
-
Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI
-
Phan RW (2009) Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI. IEEE Trans Depend Secure Comput 6(4):316-320
-
(2009)
IEEE Trans Depend Secure Comput
, vol.6
, Issue.4
, pp. 316-320
-
-
Phan, R.W.1
-
55
-
-
78751641225
-
On the security of Chien's ultralightweight RFID authentication protocol
-
Sun HM, Ting WC, Wang KH (2011) On the security of Chien's ultralightweight RFID authentication protocol. IEEE Trans Depend Secure Comput 8(2):315-317
-
(2011)
IEEE Trans Depend Secure Comput
, vol.8
, Issue.2
, pp. 315-317
-
-
Sun, H.M.1
Ting, W.C.2
Wang, K.H.3
-
56
-
-
79957590172
-
On ultralightweight RFID authentication protocols
-
D'Arco P, De Santis A (2011) On ultralightweight RFID authentication protocols. IEEE Trans Depend Secure Comput 8(4):548-563
-
(2011)
IEEE Trans Depend Secure Comput
, vol.8
, Issue.4
, pp. 548-563
-
-
D'Arco, P.1
De Santis, A.2
-
57
-
-
84862788058
-
A new ultralightweight RFID authentication protocol with permutation
-
Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702-705
-
(2012)
IEEE Commun Lett
, vol.16
, Issue.5
, pp. 702-705
-
-
Tian, Y.1
Chen, G.2
Li, J.3
-
58
-
-
54049143316
-
Elliptic-curve-based security processor for RFID
-
2530299
-
Lee YK, Sakiyama K, Batina L, Verbauwhede I (2008) Elliptic-curve-based security processor for RFID. IEEE Trans Comput 57(11):1514-1527
-
(2008)
IEEE Trans Comput
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
59
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
Gaubatz G, Kaps JP, Ozturk E, Sunar B (2005) State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Pervasive computing and communications workshops, 2005. Third IEEE international conference on PerCom 2005 workshops. IEEE, pp 146-150
-
(2005)
Pervasive Computing and Communications Workshops, 2005. Third IEEE International Conference on PerCom 2005 Workshops. IEEE
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.P.2
Ozturk, E.3
Sunar, B.4
-
63
-
-
46749130059
-
A novel mutual authentication scheme based on quadratic residues for RFID systems
-
Chen Y, Chou JS, Sun HM (2008) A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput Netw 52(12):2373-2380
-
(2008)
Comput Netw
, vol.52
, Issue.12
, pp. 2373-2380
-
-
Chen, Y.1
Chou, J.S.2
Sun, H.M.3
-
64
-
-
77949562527
-
Cryptanalysis of some RFID authentication protocols
-
Cao T, Shen P, Bertino E (2008) Cryptanalysis of some RFID authentication protocols. J Commun 3(7):20-27
-
(2008)
J Commun
, vol.3
, Issue.7
, pp. 20-27
-
-
Cao, T.1
Shen, P.2
Bertino, E.3
-
66
-
-
45749087762
-
Traceable privacy of recent provably-secure RFID protocols
-
Springer, Berlin
-
Ouafi K, Phan RCW (2008) Traceable privacy of recent provably-secure RFID protocols. In: Applied cryptography and network security. Springer, Berlin, pp 479-489
-
(2008)
Applied Cryptography and Network Security
, pp. 479-489
-
-
Ouafi, K.1
Rcw, P.2
-
68
-
-
84977783611
-
Strong and robust RFID authentication enabling perfect ownership transfer
-
Springer, Berlin
-
Lim CH, Kwon T (2006) Strong and robust RFID authentication enabling perfect ownership transfer. In: Information and communications security. Springer, Berlin, pp 1-20
-
(2006)
Information and Communications Security
, pp. 1-20
-
-
Lim, C.H.1
Kwon, T.2
|