-
1
-
-
80052993333
-
User privacy in transport systems based on RFID e-tickets
-
Malaga, Spain, October
-
A.-R. Sadeghi, I. Visconti, and C. Wachsmann, "User privacy in transport systems based on RFID e-tickets," in Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, pp. 102-122, Malaga, Spain, October 2008.
-
(2008)
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications
, pp. 102-122
-
-
Sadeghi, A.-R.1
Visconti, I.2
Wachsmann, C.3
-
2
-
-
84867297288
-
Two RFID-based solutions for secure inpatient medication administration
-
Y.-C. Yen, N.-W. Lo, and T.-C. Wu, "Two RFID-based solutions for secure inpatient medication administration," Journal of Medical Systems, vol. 36, no. 5, pp. 2769-2778, 2012.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.5
, pp. 2769-2778
-
-
Yen, Y.-C.1
Lo, N.-W.2
Wu, T.-C.3
-
3
-
-
46749130059
-
A novel mutual authentication scheme based on quadratic residues for RFID systems
-
Y. Chen, J.-S. Chou, and H.-M. Sun, "A novel mutual authentication scheme based on quadratic residues for RFID systems," Computer Networks, vol. 52, no. 12, pp. 2373-2380, 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2373-2380
-
-
Chen, Y.1
Chou, J.-S.2
Sun, H.-M.3
-
4
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
5
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Lecture Notes in Computer Science, Springer, Berlin, Germany
-
V. Miller, "Use of elliptic curves in cryptography," in Advances in Cryptology-CRYPTO '85 Proceedings, vol. 218 of Lecture Notes in Computer Science, pp. 417-426, Springer, Berlin, Germany, 1985.
-
(1985)
Advances in Cryptology-CRYPTO '85 Proceedings
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
6
-
-
49049105964
-
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
-
Las Vegas, Nev, USA, April
-
Y. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol," in IEEE International Conference on RFID, pp. 97-104, Las Vegas, Nev, USA, April 2008.
-
(2008)
IEEE International Conference on RFID
, pp. 97-104
-
-
Lee, Y.1
Batina, L.2
Verbauwhede, I.3
-
7
-
-
58449108568
-
Cryptanalysis of ECRAC, a RFID identification protocol
-
Lecture Notes in Computer Science, Springer, Berlin, Germany
-
J. Bringer, H. Chabanne, and T. Icart, "Cryptanalysis of ECRAC, a RFID identification protocol," in Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, vol. 5339 of Lecture Notes in Computer Science, pp. 149-161, Springer, Berlin, Germany, 2008.
-
(2008)
Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings
, vol.5339
, pp. 149-161
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
9
-
-
84899644274
-
A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
-
Y.-P. Liao and C.-M. Hsiao, "A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol," Ad Hoc Networks, vol. 18, pp. 133-146, 2014.
-
(2014)
Ad Hoc Networks
, vol.18
, pp. 133-146
-
-
Liao, Y.-P.1
Hsiao, C.-M.2
-
11
-
-
84898905921
-
A user anonymity preserving three-factor authentication scheme for telecaremedicine information systems
-
Z. Tan, "A user anonymity preserving three-factor authentication scheme for telecaremedicine information systems," Journal of Medical Systems, vol. 38, article 16, 2014.
-
(2014)
Journal of Medical Systems
, vol.38
-
-
Tan, Z.1
-
12
-
-
84919928059
-
Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems
-
H. Arshad and M. Nikooghadam, "Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems," Journal of Medical Systems, vol. 38, no. 12, article 136, 2014.
-
(2014)
Journal of Medical Systems
, vol.38
, Issue.12
-
-
Arshad, H.1
Nikooghadam, M.2
-
13
-
-
84936743193
-
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol
-
D. He, N. Kumar, N. Chilamkurti, and J.-H. Lee, "Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol," Journal of Medical Systems, vol. 38, article 116, 2014.
-
(2014)
Journal of Medical Systems
, vol.38
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
Lee, J.-H.4
-
15
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. J. Menezes, T. Okamoto, and S. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Transactions on Information Theory, vol. 39, no. 5, pp. 1639-1646, 1993.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.3
-
16
-
-
8344247772
-
New identitybased society oriented signature schemes from pairings on elliptic curves
-
C.-Y. Lin, T.-C. Wu, F. Zhang, and J.-J. Hwang, "New identitybased society oriented signature schemes from pairings on elliptic curves," Applied Mathematics and Computation, vol. 160, no. 1, pp. 245-260, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.160
, Issue.1
, pp. 245-260
-
-
Lin, C.-Y.1
Wu, T.-C.2
Zhang, F.3
Hwang, J.-J.4
-
17
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
Leiden, The Netherlands, July
-
A. Joux, "A one round protocol for tripartite Diffie-Hellman," in Proceedings of the 4th Algorithmic Number Theory Symposium (ANTS '00), pp. 385-394, Leiden, The Netherlands, July 2000.
-
(2000)
Proceedings of the 4th Algorithmic Number Theory Symposium (ANTS '00)
, pp. 385-394
-
-
Joux, A.1
-
18
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Lecture Notes in Computer Science
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Advances in Cryptology-CRYPTO 2001, vol. 2139 of Lecture Notes in Computer Science, pp. 213-229, 2001.
-
(2001)
Advances in Cryptology-CRYPTO 2001
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
19
-
-
84946840347
-
Short signatures from the Weil pairing
-
Lecture Notes in Computer Science, Springer, Berlin, Germany
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," in Advances in Cryptology-ASIACRYPT 2001, vol. 2248 of Lecture Notes in Computer Science, pp. 514-532, Springer, Berlin, Germany, 2001.
-
(2001)
Advances in Cryptology-ASIACRYPT 2001
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
21
-
-
21644474556
-
-
Elsevier-Morgan Kaufmann, San Francisco, Calif, USA
-
F. Zhao and L. J. Guibas, Wireless Sensor Networks: An Information Processing Approach, Elsevier-Morgan Kaufmann, San Francisco, Calif, USA, 2004.
-
(2004)
Wireless Sensor Networks: An Information Processing Approach
-
-
Zhao, F.1
Guibas, L.J.2
-
22
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
23
-
-
0345851235
-
Embedding the internet wireless integrated network sensors
-
J. Pottie and W. J. Kaiser, "Embedding the internet wireless integrated network sensors," Communications of the ACM, vol. 43, no. 5, pp. 51-58, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.5
, pp. 51-58
-
-
Pottie, J.1
Kaiser, W.J.2
-
24
-
-
0012979825
-
A taxonomy of wireless micro-sensor network models
-
S. Tilak, N. B. Abu-Ghazaleh, and W. Heinzelman, "A taxonomy of wireless micro-sensor network models," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 2, pp. 28-36, 2002.
-
(2002)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.6
, Issue.2
, pp. 28-36
-
-
Tilak, S.1
Abu-Ghazaleh, N.B.2
Heinzelman, W.3
-
25
-
-
0036040738
-
Building efficient wireless sensor networks with low-level naming
-
Banff, Canada
-
J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan, "Building efficient wireless sensor networks with low-level naming," in Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), pp. 146-159, Banff, Canada, 2001.
-
(2001)
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01)
, pp. 146-159
-
-
Heidemann, J.1
Silva, F.2
Intanagonwiwat, C.3
Govindan, R.4
Estrin, D.5
Ganesan, D.6
|