-
1
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Fut. Gen. Comput. Syst. 2013, 29, 1645–1660.
-
(2013)
Fut. Gen. Comput. Syst
, vol.29
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
2
-
-
34547555468
-
-
1st ed.; O’Reilly Media: Sebastopol, CA, USA
-
Glover, B.; Bhatt, H. RFID Essentials, 1st ed.; O’Reilly Media: Sebastopol, CA, USA, 2006.
-
(2006)
RFID Essentials
-
-
Glover, B.1
Bhatt, H.2
-
3
-
-
70350776848
-
A context aware wireless body area network (BAN)
-
PervasiveHealth 2009, London, UK, 1–3 April 2009
-
O’Donovan, T.; O’Donoghue, J.; Sreenan, C.; Sammon, D.; O’Reilly, P.; O’Connor, K. A context aware wireless body area network (BAN). In Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009, London, UK, 1–3 April 2009; pp. 1–8.
-
(2009)
Proceedings of the 3Rd International Conference on Pervasive Computing Technologies for Healthcare
, pp. 1-8
-
-
O’Donovan, T.1
O’Donoghue, J.2
Sreenan, C.3
Sammon, D.4
O’Reilly, P.5
O’Connor, K.6
-
6
-
-
0000241853
-
Predictability; Does the Flap of a Butterfly’s Wings in Brazil Set Off a Tornado in Texas
-
Lorenz, E.N. Predictability; Does the Flap of a Butterfly’s Wings in Brazil Set Off a Tornado in Texas? J. Atmos. Sci. 1972, 20: 130–141.
-
(1972)
J. Atmos. Sci
, vol.20
, pp. 130-141
-
-
Lorenz, E.N.1
-
7
-
-
84941785734
-
-
Physics Department & IQC, University of Waterloo: Waterloo, ON, Canada
-
Poulin, D. A Rough Guide to Quantum Chaos; Physics Department & IQC, University of Waterloo: Waterloo, ON, Canada, 2006.
-
(2006)
A Rough Guide to Quantum Chaos
-
-
Poulin, D.1
-
8
-
-
84949926397
-
RFID Encryption Scheme Featuring Pseudorandom Numbers and Butterfly Seed Generation
-
Split, Croatia, 17–19 September
-
Sampangi, R.V.; Sampalli, S. RFID Encryption Scheme Featuring Pseudorandom Numbers and Butterfly Seed Generation. In Proceedings of the 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 17–19 September 2014; pp. 1–5.
-
(2014)
Proceedings of the 2014 22Nd International Conference on Software, Telecommunications and Computer Networks (Softcom)
, pp. 1-5
-
-
Sampangi, R.V.1
Sampalli, S.2
-
9
-
-
0022716288
-
A simple unpredictable pseudo-random number generator
-
Blum, L.; Blum, M.; Shub, M. A simple unpredictable pseudo-random number generator. SIAM J. Comput. 1986, 15, 364–383.
-
(1986)
SIAM J. Comput
, vol.15
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
10
-
-
84856529125
-
Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags
-
Melbourne, Australia, 7–10 November
-
Melia-Segui, J.; Garcia-Alfaro, J.; Herrera-Joancomarti, J. Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags. In Proceedings of the IECON 2011 37th Annual Conference on IEEE Industrial Electronics Society, Melbourne, Australia, 7–10 November 2011; pp. 3820–3825.
-
(2011)
Proceedings of the IECON 2011 37Th Annual Conference on IEEE Industrial Electronics Society
, pp. 3820-3825
-
-
Melia-Segui, J.1
Garcia-Alfaro, J.2
Herrera-Joancomarti, J.3
-
11
-
-
80052776708
-
AKARI-X: A pseudorandom number generator for secure lightweight systems
-
Athens, Greece, 13–15 July
-
Martin, H.; San Millan, E.; Entrena, L.; Lopez, P.; Castro, J. AKARI-X: A pseudorandom number generator for secure lightweight systems. In Proceedings of the 2011 IEEE 17th International On-Line Testing Symposium (IOLTS), Athens, Greece, 13–15 July 2011; pp. 228–233.
-
(2011)
Proceedings of the 2011 IEEE 17Th International On-Line Testing Symposium (IOLTS)
, pp. 228-233
-
-
Martin, H.1
San Millan, E.2
Entrena, L.3
Lopez, P.4
Castro, J.5
-
12
-
-
84892523539
-
SHA-3 based RFID mutual authentication protocol and its implementation
-
Kunming, China, 5–8 August
-
Dong, Q.; Zhang, J.; Wei, L. A SHA-3 based RFID mutual authentication protocol and its implementation. In Proceedings of the 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC), Kunming, China, 5–8 August 2013; pp. 1–5.
-
(2013)
Proceedings of the 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC)
, pp. 1-5
-
-
Dong, Q.1
Zhang, J.2
Wei, L.A.3
-
13
-
-
84883094873
-
Symmetric key based RFID authentication protocol with a secure key-updating scheme
-
Regina, SK, Canada, 5–8 May
-
Zhu, G.; Khan, G. Symmetric key based RFID authentication protocol with a secure key-updating scheme. In Proceedings of the 2013 26th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Regina, SK, Canada, 5–8 May 2013; pp. 1–5.
-
(2013)
Proceedings of the 2013 26Th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)
, pp. 1-5
-
-
Zhu, G.1
Khan, G.2
-
14
-
-
84891804845
-
Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
-
Liu, J.; Zhang, Z.; Chen, X.; Kwak, K.S. Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 332–342.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, pp. 332-342
-
-
Liu, J.1
Zhang, Z.2
Chen, X.3
Kwak, K.S.4
-
15
-
-
84893380946
-
LIRA: A new key deployment scheme for Wireless Body Area Networks
-
Split-Primosten, Croatia, 18–20 September
-
Kovacevic, T.; Perkovic, T.; Cagalj, M. LIRA: A new key deployment scheme for Wireless Body Area Networks. In Proceedings of the 2013 21st International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split-Primosten, Croatia, 18–20 September 2013; pp. 1–6.
-
(2013)
Proceedings of the 2013 21St International Conference on Software, Telecommunications and Computer Networks (Softcom)
, pp. 1-6
-
-
Kovacevic, T.1
Perkovic, T.2
Cagalj, M.3
-
16
-
-
85175243419
-
The Road from Panama to Keccak via RadioGatún
-
Dagstuhl, Germany, 19–22 November
-
Bertoni, G.; Daemen, J.; Peeters, M.; Assche, G.V. The Road from Panama to Keccak via RadioGatún. In Proceedings of the Dagstuhl Seminar, Dagstuhl, Germany, 19–22 November 2009; pp. 1–9.
-
(2009)
Proceedings of the Dagstuhl Seminar
, pp. 1-9
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Assche, G.V.4
-
17
-
-
78249288809
-
PUF-based Encryption Processor for the RFID Systems
-
Bradford, West Yorkshire, UK, 29 June–1 July
-
Choi, W.; Kim, S.; Kim, Y.; Park, Y.; Ahn, K. PUF-based Encryption Processor for the RFID Systems. In Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), Bradford, West Yorkshire, UK, 29 June–1 July 2010, pp. 2323–2328.
-
Proceedings of the 2010 IEEE 10Th International Conference on Computer and Information Technology (CIT)
, vol.2010
, pp. 2323-2328
-
-
Choi, W.1
Kim, S.2
Kim, Y.3
Park, Y.4
Ahn, K.5
-
18
-
-
84941779648
-
EPC Radio-Frequency Identity Protocols Generation-2 UHF RFID
-
EPCglobal: Littleton, CO, USA
-
EPCglobal. EPC Radio-Frequency Identity Protocols Generation-2 UHF RFID. In EPCglobal Specifications; EPCglobal: Littleton, CO, USA, 2013; pp. 1–52.
-
(2013)
Epcglobal Specifications
, pp. 1-52
-
-
-
19
-
-
84941780614
-
ISO/IEC 29167-1:2014–Information technology–Automatic identification and data capture techniques–Part 1: Security services for RFID air interfaces
-
International Organization for Standardization (ISO): Geneva, Switzerland
-
ISO/IEC. ISO/IEC 29167-1:2014–Information technology–Automatic identification and data capture techniques–Part 1: Security services for RFID air interfaces. In International Standard; International Organization for Standardization (ISO): Geneva, Switzerland, 2014; pp. 1–52.
-
(2014)
In International Standard
, pp. 1-52
-
-
-
20
-
-
77957190300
-
Hybrid security mechanisms for wireless body area networks
-
Jeju Island, Korea, 16–18 June
-
Liu, J.; Kwak, K.S. Hybrid security mechanisms for wireless body area networks. In Proceedings of the 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN), Jeju Island, Korea, 16–18 June 2010; pp. 98–103.
-
(2010)
Proceedings of the 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN)
, pp. 98-103
-
-
Liu, J.1
Kwak, K.S.2
-
21
-
-
79551648752
-
A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication
-
Miami, FL, USA, 6–10 December
-
Luo, Y.; Chai, Q.; Gong, G.; Lai, X. A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication. In Proceedings of the 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), Miami, FL, USA, 6–10 December 2010; pp. 1–6.
-
(2010)
Proceedings of the 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
, pp. 1-6
-
-
Luo, Y.1
Chai, Q.2
Gong, G.3
Lai, X.4
-
22
-
-
80052354575
-
A Novel Stream Cipher with Hash Function for the RFID Device
-
Seoul, Korea, 30 June–2 July
-
Shen, S.S.; Liao, H.R.; Lin, S.H.; Chiu, J.H. A Novel Stream Cipher with Hash Function for the RFID Device. In Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Seoul, Korea, 30 June–2 July 2011; pp. 532–536.
-
(2011)
Proceedings of the 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
, pp. 532-536
-
-
Shen, S.S.1
Liao, H.R.2
Lin, S.H.3
Chiu, J.H.4
-
23
-
-
0026762153
-
A universal statistical test for random bit generators
-
Maurer, U. A universal statistical test for random bit generators. J. Cryptol. 1992, 5, 89–105.
-
(1992)
J. Cryptol
, vol.5
, pp. 89-105
-
-
Maurer, U.1
-
24
-
-
29144459675
-
On Separating Predictability and Determinism
-
Bishop, R.C. On Separating Predictability and Determinism. Erkenntnis 2003, 58, 169–188.
-
(2003)
Erkenntnis
, vol.58
, pp. 169-188
-
-
Bishop, R.C.1
-
25
-
-
79951503316
-
Cryptographically secure pseudo-random bit generator for RFID tags
-
London, UK, 8–10 November
-
Peris-Lopez, P.; San Millan, E.; van der Lubbe, J.; Entrena, L. Cryptographically secure pseudo-random bit generator for RFID tags. In Proceedings of the 2010 International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 8–10 November 2010; pp. 1–6.
-
(2010)
Proceedings of the 2010 International Conference for Internet Technology and Secured Transactions (ICITST)
, pp. 1-6
-
-
Peris-Lopez, P.1
San Millan, E.2
Van Der Lubbe, J.3
Entrena, L.4
-
26
-
-
70350141515
-
Efficient hardware implementation of a new pseudo-random bit sequence generator
-
Taipei, Taiwan, 24–27 May
-
Katti, R.; Srinivasan, S. Efficient hardware implementation of a new pseudo-random bit sequence generator. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2009), Taipei, Taiwan, 24–27 May 2009; pp. 1393–1396.
-
(2009)
Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2009)
, pp. 1393-1396
-
-
Katti, R.1
Srinivasan, S.2
-
27
-
-
84965066515
-
Advanced Encryption Standard (AES)
-
NIST: Springfield, IL, USA
-
National Institute of Standards and Technology (NIST). Advanced Encryption Standard (AES). In Federal Information Processing Standards Publication 197; NIST: Springfield, IL, USA, 2001; pp. 1–47.
-
(2001)
Federal Information Processing Standards Publication 197
, pp. 1-47
-
-
-
28
-
-
67650546185
-
-
EPCglobal: Littleton, CO, USA
-
EPCglobal. Tag Class Definitions; EPCglobal: Littleton, CO, USA, 2007.
-
(2007)
Tag Class Definitions
-
-
-
29
-
-
84884253230
-
A security suite for wireless body area networks
-
Sampangi, R.V.; Dey, S.; Urs, S.R.; Sampalli, S. A security suite for wireless body area networks. Int. J. Netw. Secur. Appl. (IJNSA) 2012, 4, 97–116.
-
(2012)
Int. J. Netw. Secur. Appl. (IJNSA)
, vol.4
, pp. 97-116
-
-
Sampangi, R.V.1
Dey, S.2
Urs, S.R.3
Sampalli, S.4
-
31
-
-
0002969802
-
A method of establishing groups of equal amplitude in plant sociology based on similarity of species content and its application to analyses of the vegetation on Danish commons
-
Sorensen, T. A method of establishing groups of equal amplitude in plant sociology based on similarity of species content and its application to analyses of the vegetation on Danish commons. Biol. Skr. K. Dan. Vidensk. Selsk. 1957, 5, 1–34.
-
(1957)
Biol. Skr. K. Dan. Vidensk. Selsk
, vol.5
, pp. 1-34
-
-
Sorensen, T.1
-
32
-
-
0003822632
-
-
National Institute of Standards and Technology (NIST): Springfield, IL, USA
-
Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A.; et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; National Institute of Standards and Technology (NIST): Springfield, IL, USA, 2010.
-
(2010)
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
-
33
-
-
84941750922
-
The Scyther Tool
-
University of Oxford: Oxford, UK
-
Cremers, C. The Scyther Tool.; Department of Computer Science, University of Oxford: Oxford, UK, 2014.
-
(2014)
Department of Computer Science
-
-
Cremers, C.1
-
34
-
-
0030708255
-
A hierarchy of authentication specifications
-
Rockport, MA, USA, 10–12 June
-
Lowe, G. A hierarchy of authentication specifications. In Proceedings of the 10th Computer Security Foundations Workshop, Rockport, MA, USA, 10–12 June 1997; pp. 31–43.
-
(1997)
Proceedings of the 10Th Computer Security Foundations Workshop
, pp. 31-43
-
-
Lowe, G.1
|