-
1
-
-
84962624455
-
-
UN, World Population Aging 2013
-
UN, "World Population Aging 2013, " 2013, pp. 8-10.
-
(2013)
, pp. 8-10
-
-
-
2
-
-
24644498485
-
RFID: A technical overview and its application to the enterprise
-
May/Jun
-
R. Weinstein, "RFID: A technical overview and its application to the enterprise, " IEEE IT Prof., vol. 7, no. 3, pp. 27-33, May/Jun. 2005.
-
(2005)
IEEE IT Prof
, vol.7
, Issue.3
, pp. 27-33
-
-
Weinstein, R.1
-
3
-
-
77956877124
-
The Internet of Things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey, " Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Comput. Netw
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
4
-
-
79952440568
-
Real-Time location and inpatient care systems based on passive RFID
-
P. Najera, J. Lopez, and R. Roman, "Real-Time location and inpatient care systems based on passive RFID, " J. Netw. Comput. Appl., vol. 34, no. 3, pp. 980-989, 2011.
-
(2011)
J. Netw. Comput. Appl
, vol.34
, Issue.3
, pp. 980-989
-
-
Najera, P.1
Lopez, J.2
Roman, R.3
-
5
-
-
84892307124
-
-
New York, NY, USA Springer
-
D. Ranasinghe, Q. Sheng, and S. Zeadally, Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks. New York, NY, USA: Springer, 2010.
-
(2010)
Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks
-
-
Ranasinghe, D.1
Sheng, Q.2
Zeadally, S.3
-
6
-
-
84962497734
-
-
Ph.D. dissertation, Dept. Comput. Sci. Inform. Eng., Fu Jen Catholic Univ., New Taipei City, Taiwan
-
Y. Hung, "The study of adopting RFID technology in medical institute with the perspectives of cost benefit, " Ph.D. dissertation, Dept. Comput. Sci. Inform. Eng., Fu Jen Catholic Univ., New Taipei City, Taiwan, 2011.
-
(2011)
The Study of Adopting RFID Technology in Medical Institute with the Perspectives of Cost Benefit
-
-
Hung, Y.1
-
7
-
-
57549090091
-
Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology
-
J. Katz and R. Rice, "Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology, " Int. J. Med. Informat., vol. 78, no. 2, pp. 104-114, 2009.
-
(2009)
Int. J. Med. Informat
, vol.78
, Issue.2
, pp. 104-114
-
-
Katz, J.1
Rice, R.2
-
8
-
-
84876293183
-
-
M.A.Thesis, College of Management, National Taiwan Univ., Taipei City, Taiwan
-
J. Leu, "The benefit analysis of RFID use in the health management center-The experience in Shin Kong Wu Ho-Su Memorial Hospital, " M.A.Thesis, College of Management, National Taiwan Univ., Taipei City, Taiwan, 2010.
-
(2010)
The Benefit Analysis of RFID Use in the Health Management Center-The Experience in Shin Kong Wu Ho-Su Memorial Hospital
-
-
Leu, J.1
-
9
-
-
84867882863
-
The adoption and implementation of RFID technologies in healthcare: A literature review
-
W. Yao, C. Chu, and Z. Li, "The adoption and implementation of RFID technologies in healthcare: A literature review, " J. Med. Syst., vol. 36, no. 6, pp. 3507-3525, 2012.
-
(2012)
J. Med. Syst
, vol.36
, Issue.6
, pp. 3507-3525
-
-
Yao, W.1
Chu, C.2
Li, Z.3
-
10
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
-
H. Chien and C. Chen, "Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards, " Comput. Stand. Interfaces, vol. 29, no. 2, pp. 254-259, 2007.
-
(2007)
Comput. Stand. Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.1
Chen, C.2
-
11
-
-
33751513718
-
Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
-
D. Duc, J. Park, H. Lee, and K. Kim, "Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning, " in Proc. Symp. Cryptogr. Inf. Secur., 2006, pp. 97-107.
-
(2006)
Proc. Symp. Cryptogr. Inf. Secur
, pp. 97-107
-
-
Duc, D.1
Park, J.2
Lee, H.3
Kim, K.4
-
13
-
-
77957851534
-
Securing RFID systems conforming to EPC class 1 generation 2 standard
-
T. Yeh, Y. Wanga, T. Kuo, and S. Wang, "Securing RFID systems conforming to EPC class 1 generation 2 standard, " Exp. Syst. Appl., vol. 37, no. 12, pp. 7678-7683, 2010.
-
(2010)
Exp. Syst. Appl
, vol.37
, Issue.12
, pp. 7678-7683
-
-
Yeh, T.1
Wanga, Y.2
Kuo, T.3
Wang, S.4
-
14
-
-
36248971663
-
LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags
-
P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda, "LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags, " in Proc. 2nd Workshop RFID Secur., 2006, pp. 27-36.
-
(2006)
Proc. 2nd Workshop RFID Secur
, pp. 27-36
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
15
-
-
33845455482
-
EMAP: An efficient mutual authentication protocol for low-cost RFID tags
-
P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda, "EMAP: An efficient mutual authentication protocol for low-cost RFID tags, " in Proc. OTM Federated Conf. Workshop: IS Workshop, 2006, pp. 352-361.
-
(2006)
Proc. OTM Federated Conf. Workshop: IS Workshop
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
16
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S.Weis, S. Sarma, R. Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems, " in Proc. Int. Conf. Secur. Pervasive Comput., 2003, pp. 454-469.
-
(2003)
Proc. Int. Conf. Secur. Pervasive Comput
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
18
-
-
41549156956
-
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
-
J. Lim, H. Oh, and S. Kim, "A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection, " in Proc. 4th Int. Conf. Inf. Secur. Pract. Exper. (ISPEC), 2008, pp. 278-289.
-
(2008)
Proc. 4th Int. Conf. Inf. Secur. Pract. Exper. (ISPEC
, pp. 278-289
-
-
Lim, J.1
Oh, H.2
Kim, S.3
-
19
-
-
67349277179
-
A privacy and authentication protocol for passive RFID tags
-
A. Liu and A. Bailey, "A privacy and authentication protocol for passive RFID tags, " Comput. Commun., vol. 32, no. 7, pp. 1194-1199, 2009.
-
(2009)
Comput. Commun
, vol.32
, Issue.7
, pp. 1194-1199
-
-
Liu, A.1
Bailey, A.2
-
20
-
-
57049150751
-
A study on secure RFID mutual authentication scheme in pervasive
-
S. Kang, D. Lee, and I. Lee, "A study on secure RFID mutual authentication scheme in pervasive, " Comput. Commun., vol. 31, no. 18, pp. 4248-4254, 2008.
-
(2008)
Comput. Commun
, vol.31
, Issue.18
, pp. 4248-4254
-
-
Kang, S.1
Lee, D.2
Lee, I.3
-
21
-
-
78751647847
-
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
-
J. Cho, S. Yeo, and S. Kim, "Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value, " Comput. Commun., vol. 34, no. 3, pp. 391-397, 2011.
-
(2011)
Comput. Commun
, vol.34
, Issue.3
, pp. 391-397
-
-
Cho, J.1
Yeo, S.2
Kim, S.3
-
22
-
-
33847249519
-
Security and privacy issues in Epassports
-
A. Juels, D. Molner, and D. Wagner, "Security and privacy issues in Epassports, " in Proc. 1st Int. Conf. Secur. Privacy Emerg. Areas Commun. Netw. (Secure Comm'05), 2005, pp. 74-88.
-
(2005)
Proc. 1st Int. Conf. Secur. Privacy Emerg. Areas Commun. Netw. (Secure Comm'05
, pp. 74-88
-
-
Juels, A.1
Molner, D.2
Wagner, D.3
-
23
-
-
49049102047
-
Robust, anonymous RFID authentication with constant key-lookup
-
M. Burmester, B. Medeiros, and R. Motta, "Robust, anonymous RFID authentication with constant key-lookup, " Cryptology ePrint Archive: Report: 207/402, 2007.
-
(2007)
Cryptology EPrint Archive: Report: 207/402
-
-
Burmester, M.1
Medeiros, B.2
Motta, R.3
-
24
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
G. Gaubatz, J. Kaps, E. Ozturk, and B. Sunar, "State of the art in ultra-low power public key cryptography for wireless sensor networks, " in Proc. 3rd IEEE Int. Conf. Pervasive Comput. Commun. Workshops (PERCOMW'05), 2005, pp. 146-150.
-
(2005)
Proc. 3rd IEEE Int. Conf. Pervasive Comput. Commun. Workshops (PERCOMW'05
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.2
Ozturk, E.3
Sunar, B.4
-
25
-
-
53749094694
-
Public key cryptography based privacy preserving multi-context RFID infrastructure
-
S. Kaya, E. Savas, A. Levi, and O. Ercetin, "Public key cryptography based privacy preserving multi-context RFID infrastructure, " Ad Hoc Netw., vol. 7, no. 1, pp. 136-152, 2009.
-
(2009)
Ad Hoc Netw
, vol.7
, Issue.1
, pp. 136-152
-
-
Kaya, S.1
Savas, E.2
Levi, A.3
Ercetin, O.4
-
27
-
-
54049143316
-
Elliptic-curve-based security processor for RFID
-
Y. Lee, K. Sakiyama, and L. Batina, "Elliptic-curve-based security processor for RFID, " IEEE Trans. Comput., vol. 57, no. 11, pp. 1514-1527, 2008.
-
(2008)
IEEE Trans. Comput
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Lee, Y.1
Sakiyama, K.2
Batina, L.3
-
28
-
-
78650123975
-
An ECDSA processor for RFID authentication
-
M. Hutter, M. Feldhofer, and T. Plos, "An ECDSA processor for RFID authentication, " in Proc. Radio Freq. Identif. Secur. Privacy Issues, 2010, pp. 189-202.
-
(2010)
Proc. Radio Freq. Identif. Secur. Privacy Issues
, pp. 189-202
-
-
Hutter, M.1
Feldhofer, M.2
Plos, T.3
-
29
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems, " Math. Comput., vol. 48, no. 1, pp. 203-209, 1987.
-
(1987)
Math. Comput
, vol.48
, Issue.1
, pp. 203-209
-
-
Koblitz, N.1
-
30
-
-
84944878354
-
-
Boca Raton, FL, USA CRC Press
-
A. Menezes, P. Van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
31
-
-
34548353243
-
Is elliptic-curve cryptography suitable to secure RFID tags?
-
J. Wolkerstorfer, "Is elliptic-curve cryptography suitable to secure RFID tags?, " in Proc. Workshop RFID Light-Weight Cryptogr., 2005, pp. 11-20.
-
(2005)
Proc. Workshop RFID Light-Weight Cryptogr
, pp. 11-20
-
-
Wolkerstorfer, J.1
-
33
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
C. Schnorr, "Efficient identification and signatures for smart cards, " in Proc. Adv. Cryptol.(CRYPTO'89), 1989, pp. 239-252.
-
(1989)
Proc. Adv. Cryptol.(CRYPTO'89
, pp. 239-252
-
-
Schnorr, C.1
-
35
-
-
0001859260
-
Provably secure and practical identification schemes and corresponding signature schemes
-
T. Okamoto, "Provably secure and practical identification schemes and corresponding signature schemes, " in Proc. Adv. Cryptol.(CRYPTO'92), 1992, pp. 31-53.
-
(1992)
Proc. Adv. Cryptol.(CRYPTO'92
, pp. 31-53
-
-
Okamoto, T.1
-
36
-
-
49049105964
-
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
-
Y. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol, " in Proc. IEEE Int. Conf. RFID, 2008, pp. 97-104.
-
(2008)
Proc IEEE Int. Conf. RFID
, pp. 97-104
-
-
Lee, Y.1
Batina, L.2
Verbauwhede, I.3
-
37
-
-
58449108568
-
Cryptanalysis of EC-RAC, a RFID identification protocol
-
J. Bringer, H. Chabanne, and T. Icart, "Cryptanalysis of EC-RAC, a RFID identification protocol, " in Proc. 7th Int. Conf. Cryptol. Netw. Secur. (CNS'08), 2008, pp. 149-161.
-
(2008)
Proc. 7th Int. Conf. Cryptol. Netw. Secur. (CNS'08
, pp. 149-161
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
38
-
-
70349268101
-
Untraceable RFID authentication protocols: Revision of EC-RAC
-
Y. Lee, L. Batina, and I. Verbauwhede, "Untraceable RFID authentication protocols: Revision of EC-RAC, " in Proc. IEEE Int. Conf. RFID, 2009, pp. 178-185.
-
(2009)
Proc IEEE Int. Conf. RFID
, pp. 178-185
-
-
Lee, Y.1
Batina, L.2
Verbauwhede, I.3
-
39
-
-
77952353685
-
Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC
-
T. Deursen and S. Radomirovic, "Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC, " Cryptology ePrint Archive, Report, 2009/332, 2009.
-
(2009)
Cryptology EPrint Archive, Report
, vol.332
, pp. 2009
-
-
Deursen, T.1
Radomirovic, S.2
-
40
-
-
84962603175
-
A combined approach of elliptic curve and zero knowledge based forward secure protocol
-
M. Sandhya and T. Rangaswamy, "A combined approach of elliptic curve and zero knowledge based forward secure protocol, " World Acad. Sci. Eng. Technol., vol. 56, pp. 847-852, 2009.
-
(2009)
World Acad. Sci. Eng. Technol
, vol.56
, pp. 847-852
-
-
Sandhya, M.1
Rangaswamy, T.2
-
41
-
-
65249186388
-
A secure elliptic curve-based RFID protocol
-
S. Martinez, M. Valls, and C. Roig, "A secure elliptic curve-based RFID protocol, " J. Comput. Sci. Technol., vol. 24, no. 2, pp. 309-318, 2009.
-
(2009)
J. Comput. Sci. Technol
, vol.24
, Issue.2
, pp. 309-318
-
-
Martinez, S.1
Valls, M.2
Roig, C.3
-
42
-
-
80051974120
-
Vulnerability analysis of elliptic curvebased RFID protocol
-
C. Lv, H. Li, J. Ma, and B. Niu, "Vulnerability analysis of elliptic curvebased RFID protocol, " China Commun., vol. 8, no. 4, pp. 153-158, 2011.
-
(2011)
China Commun
, vol.8
, Issue.4
, pp. 153-158
-
-
Lv, C.1
Li, H.2
Ma, J.3
Niu, B.4
-
43
-
-
77952337733
-
Low-cost untraceable authentication protocols for RFID
-
Y. Lee, L. Batina, D. Singelee, and I. Verbauwhede, "Low-cost untraceable authentication protocols for RFID, " in Proc. 3rd ACM Conf. Wireless Netw. Secur. (WiSec'10), 2010, pp. 55-64.
-
(2010)
Proc. 3rd ACM Conf. Wireless Netw. Secur. (WiSec'10
, pp. 55-64
-
-
Lee, Y.1
Batina, L.2
Singelee, D.3
Verbauwhede, I.4
-
44
-
-
78650082766
-
On the claimed privacy of EC-RAC III
-
J. Fan, J. Hermans, and F. Vercauteren, "On the claimed privacy of EC-RAC III, " Radio Freq. Identif. Secur. Privacy Issues, 2010, pp. 66-74.
-
(2010)
Radio Freq. Identif. Secur. Privacy Issues
, pp. 66-74
-
-
Fan, J.1
Hermans, J.2
Vercauteren, F.3
-
45
-
-
84872326702
-
Privacy challenges in RFID systems
-
Y. Lee, L. Batina, and I. Verbauwhede, "Privacy challenges in RFID systems, " in Proc. Internet Things, 2010, pp. 397-407.
-
(2010)
Proc. Internet Things
, pp. 397-407
-
-
Lee, Y.1
Batina, L.2
Verbauwhede, I.3
-
46
-
-
84872290581
-
Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols
-
C. Lv, H. Li, and J. Ma, "Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols, " Trans. Emerg. Telecommun. Technol., vol. 23, no. 7, pp. 618-624, 2012.
-
(2012)
Trans. Emerg. Telecommun. Technol
, vol.23
, Issue.7
, pp. 618-624
-
-
Lv, C.1
Li, H.2
Ma, J.3
-
47
-
-
84885893141
-
Wide-weak privacy-preserving RFID authentication protocols
-
Y. Lee, L. Batina, and D. Singelee, "Wide-weak privacy-preserving RFID authentication protocols, " in Proc. Mobile Lightweight Wireless Syst., 2010, pp. 254-267.
-
(2010)
Proc. Mobile Lightweight Wireless Syst
, pp. 254-267
-
-
Lee, Y.1
Batina, L.2
Singelee, D.3
-
49
-
-
79961143767
-
An ECDLP-based randomized key RFID authentication protocol
-
X. Zhang, J. Li, and Y. Wu, "An ECDLP-based randomized key RFID authentication protocol, " in Proc. Int. Conf. Netw. Comput. Inf. Secur. (NCIS), 2011, pp. 146-149.
-
(2011)
Proc. Int. Conf. Netw. Comput. Inf. Secur. (NCIS
, pp. 146-149
-
-
Zhang, X.1
Li, J.2
Wu, Y.3
-
50
-
-
84873534063
-
On the security of an ECC based RFID authentication protocol
-
P. Babaheidarian, M. Delavar, and J. Mohajeri, "On the security of an ECC based RFID authentication protocol, " in Proc. 9th Int. ISC Conf. Inf. Secur. Cryptol. (ISCISC), 2012, pp. 111-114.
-
(2012)
Proc. 9th Int. ISC Conf. Inf. Secur. Cryptol. (ISCISC
, pp. 111-114
-
-
Babaheidarian, P.1
Delavar, M.2
Mohajeri, J.3
-
51
-
-
82155181956
-
Elliptic curve cryptography based authentication protocol for low-cost RFID tags
-
G. Godor and S. Imre, "Elliptic curve cryptography based authentication protocol for low-cost RFID tags, " in Proc. IEEE Int. Conf. RFID-Technol. Appl., 2011, pp. 386-393.
-
(2011)
Proc IEEE Int. Conf. RFID-Technol. Appl
, pp. 386-393
-
-
Godor, G.1
Imre, S.2
-
52
-
-
84919496857
-
A novel RFID authentication protocol based on elliptic curve cryptosystem
-
Y. Chen, J. Chou, and C. Lin, "A novel RFID authentication protocol based on elliptic curve cryptosystem, " Cryptology ePrint Archive, Report, 2011/381, 2011.
-
(2011)
Cryptology EPrint Archive, Report 2011
, vol.381
-
-
Chen, Y.1
Chou, J.2
Lin, C.3
-
53
-
-
84856094376
-
Hierarchical ECC-based RFID authentication protocol
-
L. Batina, S. Seys, and D. Singeee, "Hierarchical ECC-based RFID authentication protocol, " in Proc. RFID Secur. Privacy, 2012, pp. 183-201.
-
(2012)
Proc. RFID Secur. Privacy
, pp. 183-201
-
-
Batina, L.1
Seys, S.2
Singeee, D.3
-
54
-
-
84887275465
-
A lightweight RFID authentication protocol based on elliptic curve cryptography
-
Y. Liu, X. Qin, and C. Wang, "A lightweight RFID authentication protocol based on elliptic curve cryptography, " J. Comput., vol. 8, no. 11, pp. 2880-2887, 2013.
-
(2013)
J. Comput
, vol.8
, Issue.11
, pp. 2880-2887
-
-
Liu, Y.1
Qin, X.2
Wang, C.3
-
55
-
-
84873981263
-
Analysis and construction of efficient RFID authentication protocol with backward privacy
-
Berlin, Germany: Springer-Verlag
-
S. Wang, S. Liu, and D. Chen, "Analysis and construction of efficient RFID authentication protocol with backward privacy, " in Advances in Wireless Sensor Networks. Berlin, Germany: Springer-Verlag, 2014, pp. 458-466.
-
(2014)
Advances in Wireless Sensor Networks
, pp. 458-466
-
-
Wang, S.1
Liu, S.2
Chen, D.3
-
56
-
-
84879295706
-
A secure ECC-based RFID authentication scheme using hybrid protocols
-
Berlin, Germany: Springer-Verlag
-
Y. Liao and C. Hsiao, "A secure ECC-based RFID authentication scheme using hybrid protocols, " in Advances in Intelligent Systems and Applications. Berlin, Germany: Springer-Verlag, 2013, pp. 1-13.
-
(2013)
Advances in Intelligent Systems and Applications
, pp. 1-13
-
-
Liao, Y.1
Hsiao, C.2
-
57
-
-
84899644274
-
A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
-
Y. Liao and C. Hsiao, "A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol, " Ad Hoc Netw., vol. 18, pp. 133-146, 2014.
-
(2014)
Ad Hoc Netw
, vol.18
, pp. 133-146
-
-
Liao, Y.1
Hsiao, C.2
-
58
-
-
84907591223
-
An efficient mutual authentication RFID scheme based on elliptic curve cryptography
-
J. Chou, "An efficient mutual authentication RFID scheme based on elliptic curve cryptography, " J. Supercomput., vol. 70, no. 1, pp. 75-94, 2014.
-
(2014)
J. Supercomput
, vol.70
, Issue.1
, pp. 75-94
-
-
Chou, J.1
-
59
-
-
84901582234
-
A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem
-
Z. Zhao, "A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem, " J. Med. Syst., vol. 38, no. 5, 2014, doi: 10.1007/s10916-014-0046-9.
-
(2014)
J. Med. Syst
, vol.38
, Issue.5
-
-
Zhao, Z.1
-
60
-
-
84898915190
-
An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography
-
Z. Zhang and Q. Qi, "An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography, " J. Med. Syst., vol. 38, no. 5, 2014, doi: 10.1007/s10916-014-0047-8.
-
(2014)
J. Med. Syst
, vol.38
, Issue.5
-
-
Zhang, Z.1
Qi, Q.2
-
61
-
-
84919877584
-
Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
-
M. Farash, "Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography, " J. Supercomput., 2014, doi: 10.1007/s11227-014-1272-0.
-
(2014)
J. Supercomput
-
-
Farash, M.1
-
62
-
-
33846260842
-
High-speed hardware implementations of elliptic curve cryptography: A survey
-
G. Dormale and J. Quisquater, "High-speed hardware implementations of elliptic curve cryptography: A survey, " J. Syst. Archit., vol. 53, no. 2, pp. 72-84, 2007.
-
(2007)
J. Syst. Archit
, vol.53
, Issue.2
, pp. 72-84
-
-
Dormale, G.1
Quisquater, J.2
-
63
-
-
37149018890
-
A survey of lightweightcryptography implementations
-
T. Eisenbarth, S. Kumar, and C. Paar, "A survey of lightweightcryptography implementations, " IEEE Des. Test Comput., vol. 24, no. 6, pp. 522-533, 2007.
-
(2007)
IEEE Des. Test Comput
, vol.24
, Issue.6
, pp. 522-533
-
-
Eisenbarth, T.1
Kumar, S.2
Paar, C.3
-
64
-
-
80052326400
-
Elliptic curve cryptography: Survey and its security applications
-
S. Kalra and S. Sood, "Elliptic curve cryptography: Survey and its security applications, " in Proc. Int. Conf. Adv. Comput. Artif. Intell., 2011, pp. 102-106.
-
(2011)
Proc. Int. Conf. Adv. Comput. Artif. Intell
, pp. 102-106
-
-
Kalra, S.1
Sood, S.2
-
65
-
-
52449127948
-
Enabling next-generation RFID applications: Solutions and challenges
-
Sep
-
Q. Sheng, X. Li, and S. Zeadally, "Enabling next-generation RFID applications: Solutions and challenges, " IEEE Comput., vol. 41, no. 9, pp. 21-28, Sep. 2008.
-
(2008)
IEEE Comput
, vol.41
, Issue.9
, pp. 21-28
-
-
Sheng, Q.1
Li, X.2
Zeadally, S.3
-
66
-
-
84906756164
-
CPAL: A conditional privacy-preserving authentication with access linkability for roaming service
-
Feb
-
C. Lai et al., "CPAL: A conditional privacy-preserving authentication with access linkability for roaming service, " IEEE Internet Things J., vol. 1, no. 1, pp. 46-57, Feb. 2014.
-
(2014)
IEEE Internet Things J
, vol.1
, Issue.1
, pp. 46-57
-
-
Lai, C.1
-
67
-
-
84906261221
-
RFID technology for IoT-based personal healthcare in smart spaces
-
Apr
-
S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, and G. Marrocco, "RFID technology for IoT-based personal healthcare in smart spaces, " IEEE Internet Things J., vol. 1, no. 2, pp. 144-152, Apr. 2014.
-
(2014)
IEEE Internet Things J
, vol.1
, Issue.2
, pp. 144-152
-
-
Amendola, S.1
Lodato, R.2
Manzari, S.3
Occhiuzzi, C.4
Marrocco, G.5
-
68
-
-
84894255457
-
An enhanced access control scheme in wireless sensor networks
-
S. Chatterjee, A. K. Das, and J. K. Sing, "An enhanced access control scheme in wireless sensor networks, " Ad Hoc Sens. Wireless Netw., vol. 21, no. 1-2, pp. 121-149, 2014.
-
(2014)
Ad Hoc Sens. Wireless Netw
, vol.21
, Issue.1-2
, pp. 121-149
-
-
Chatterjee, S.1
Das, A.K.2
Sing, J.K.3
|