-
1
-
-
84906842496
-
Research directions for the Internet of Things
-
Feb.
-
J. A. Stankovic, "Research directions for the Internet of Things," IEEE Internet Things J., vol. 1, no. 1, pp. 3-9, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 3-9
-
-
Stankovic, J.A.1
-
2
-
-
84906261221
-
RFID technology for IoT-based personal healthcare in smart spaces
-
Apr.
-
S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, and G. Marrocco, "RFID technology for IoT-based personal healthcare in smart spaces," IEEE Internet Things J., vol. 1, no. 2, pp. 144-152, Apr. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.2
, pp. 144-152
-
-
Amendola, S.1
Lodato, R.2
Manzari, S.3
Occhiuzzi, C.4
Marrocco, G.5
-
3
-
-
84961801375
-
PRLS-INVES: A general experimental investigation strategy for high accuracy and precision in passive RFID location systems
-
Apr.
-
P. Yang, "PRLS-INVES: A general experimental investigation strategy for high accuracy and precision in passive RFID location systems," IEEE Internet Things J., vol. 2, no. 2, pp. 159-167, Apr. 2015.
-
(2015)
IEEE Internet Things J.
, vol.2
, Issue.2
, pp. 159-167
-
-
Yang, P.1
-
4
-
-
84919978090
-
Securing the Internet of Things: A standardization perspective
-
Jun.
-
S. L. Keoh, S. S. Kumar, and H. Tschofenig, "Securing the Internet of Things: A standardization perspective," IEEE Internet Things J., vol. 1, no. 3, pp. 265-275, Jun. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.3
, pp. 265-275
-
-
Keoh, S.L.1
Kumar, S.S.2
Tschofenig, H.3
-
5
-
-
84962562081
-
An analysis of RFID authentication schemes for Internet of things in healthcare environment using elliptic curve cryptography
-
Feb.
-
D. He and S. Zeadally, "An analysis of RFID authentication schemes for Internet of things in healthcare environment using elliptic curve cryptography," IEEE Internet Things J., vol. 2, no. 1, pp. 72-83, Feb. 2015.
-
(2015)
IEEE Internet Things J.
, vol.2
, Issue.1
, pp. 72-83
-
-
He, D.1
Zeadally, S.2
-
6
-
-
59649125918
-
RFID-enabled discovery of supply networks
-
Feb.
-
H. H. Bi and D. K. J. Lin, "RFID-enabled discovery of supply networks," IEEE Trans. Eng. Manage., vol. 56, no. 1, pp. 129-141, Feb. 2009.
-
(2009)
IEEE Trans. Eng. Manage.
, vol.56
, Issue.1
, pp. 129-141
-
-
Bi, H.H.1
Lin, D.K.J.2
-
7
-
-
84885963806
-
Critical analysis and comparative study of security for networked RFID systems
-
Honolulu, HI, USA
-
B. R. Ray, M. Chowdhury, and J. Abawajy, "Critical analysis and comparative study of security for networked RFID systems," in Proc. 14th ACIS Int. Conf. Softw. Eng. Artif. Intell. Netw. Parallel/Distrib. Comput. (SNPD), Honolulu, HI, USA, 2013, pp. 197-202.
-
(2013)
Proc. 14th ACIS Int. Conf. Softw. Eng. Artif. Intell. Netw. Parallel/Distrib. Comput. (SNPD)
, pp. 197-202
-
-
Ray, B.R.1
Chowdhury, M.2
Abawajy, J.3
-
8
-
-
84875116626
-
Pathchecker: An RFID application for tracing products in suply-chains
-
Leuven, Belgium
-
K. Ouafi and S. Vaudenay, "Pathchecker: An RFID application for tracing products in suply-chains," in Proc. Inf. Security Group (GSI), Leuven, Belgium, 2009, pp. 1-14.
-
(2009)
Proc. Inf. Security Group (GSI)
, pp. 1-14
-
-
Ouafi, K.1
Vaudenay, S.2
-
9
-
-
77953897563
-
Supply chain control using a RFID proxy re-signature scheme
-
Orlando, FL, USA
-
T. Burbridge and A. Soppera, "Supply chain control using a RFID proxy re-signature scheme," in Proc. IEEE Int. Conf. RFID, Orlando, FL, USA, 2010, pp. 29-36.
-
(2010)
Proc. IEEE Int. Conf. RFID
, pp. 29-36
-
-
Burbridge, T.1
Soppera, A.2
-
10
-
-
85180623483
-
Tracker: Security and privacy for RFID-based supply chains
-
San Diego, CA, USA
-
E.-O. Blass, K. Elkhiyaoui, and R. Molva, "Tracker: Security and privacy for RFID-based supply chains," in Proc. 18th Netw. Distrib. Syst. Security Symp., San Diego, CA, USA, 2011, pp. 29-36.
-
(2011)
Proc. 18th Netw. Distrib. Syst. Security Symp.
, pp. 29-36
-
-
Blass, E.-O.1
Elkhiyaoui, K.2
Molva, R.3
-
11
-
-
84860657792
-
CHECKER: On-site checking in RFID-based supply chains
-
Tucson, AZ, USA
-
K. Elkhiyaoui, E.-O. Blass, and R. Molva, "CHECKER: On-site checking in RFID-based supply chains," in Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw., Tucson, AZ, USA, 2012, pp. 173-184.
-
(2012)
Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw.
, pp. 173-184
-
-
Elkhiyaoui, K.1
Blass, E.-O.2
Molva, R.3
-
12
-
-
84946530951
-
PUF-based secure checker protocol for networked RFID systems
-
Subang, Malaysia
-
B. Ray, M. Chowdhury, and J. Abawaiy, "PUF-based secure checker protocol for networked RFID systems," in Proc. IEEE Conf. Open Syst. (ICOS), Subang, Malaysia, 2014, pp. 78-83.
-
(2014)
Proc. IEEE Conf. Open Syst. (ICOS)
, pp. 78-83
-
-
Ray, B.1
Chowdhury, M.2
Abawaiy, J.3
-
13
-
-
80051668213
-
Networked RFID systems
-
P. H. Cole and D. C. Ranasinghe, Eds. Heidelberg, Germany: Springer
-
D. C. Ranasinghe and P. H. Cole, "Networked RFID systems," in Networked RFID Systems and Lightweight Cryptography, P. H. Cole and D. C. Ranasinghe, Eds. Heidelberg, Germany: Springer, 2008, pp. 45-58.
-
(2008)
Networked RFID Systems and Lightweight Cryptography
, pp. 45-58
-
-
Ranasinghe, D.C.1
Cole, P.H.2
-
14
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645-1660, 2013.
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
15
-
-
67650240831
-
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
-
Alexandria, VA, USA
-
C. J. F. Cremers, "Unbounded verification, falsification, and characterization of security protocols by pattern refinement," in Proc. 15th ACM Conf. Comput. Commun. Security (CCS), Alexandria, VA, USA, 2008, pp. 119-128.
-
(2008)
Proc. 15th ACM Conf. Comput. Commun. Security (CCS)
, pp. 119-128
-
-
Cremers, C.J.F.1
-
17
-
-
49049105769
-
Design and implementation of PUF-based 'unclonable' RFID ICs for anti-counterfeiting and security applications
-
Las Vegas, NV, USA
-
S. Devadas et al., "Design and implementation of PUF-based 'unclonable' RFID ICs for anti-counterfeiting and security applications," in Proc. IEEE Int. Conf. RFID, Las Vegas, NV, USA, 2008, pp. 58-64.
-
(2008)
Proc. IEEE Int. Conf. RFID
, pp. 58-64
-
-
Devadas, S.1
-
18
-
-
85019715933
-
Enhancing RFID security and privacy by physically unclonable functions
-
A.-R. Sadeghi and D. Naccache, Eds. Heidelberg, Germany: Springer
-
A.-R. Sadeghi, I. Visconti, and C. Wachsmann, "Enhancing RFID security and privacy by physically unclonable functions," in Towards Hardware-Intrinsic Security, A.-R. Sadeghi and D. Naccache, Eds. Heidelberg, Germany: Springer, 2010, pp. 281-305.
-
(2010)
Towards Hardware-Intrinsic Security
, pp. 281-305
-
-
Sadeghi, A.-R.1
Visconti, I.2
Wachsmann, C.3
-
19
-
-
84873433835
-
Security with noisy data
-
London, U.K.: Springer
-
Y. Dodis, L. Reyzin, and A. Smith, "Security with noisy data," in Fuzzy Extractors. London, U.K.: Springer, 2007, pp. 79-99.
-
(2007)
Fuzzy Extractors.
, pp. 79-99
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
20
-
-
84868313780
-
A privacy-preserving path-checking solution for RFID-based supply chains
-
T. Chim and T. Yuen, Eds. Heidelberg, Germany: Springer
-
W. Xin, H. Sun, T. Yang, Z. Guan, and Z. Chen, "A privacy-preserving path-checking solution for RFID-based supply chains," in Information and Communications Security, vol. 7618, T. Chim and T. Yuen, Eds. Heidelberg, Germany: Springer, 2012, pp. 400-407.
-
(2012)
Information and Communications Security
, vol.7618
, pp. 400-407
-
-
Xin, W.1
Sun, H.2
Yang, T.3
Guan, Z.4
Chen, Z.5
-
21
-
-
84888188818
-
A RFID path-checking protocol based on ordered multisignatures
-
Fairfax, VA, USA: IOS Press
-
W. Xin, H. Sun, Z. Wang, Z. Guan, and Z. Chen, "A RFID path-checking protocol based on ordered multisignatures," in Radio Frequency Identification System Security, vol. 8. Fairfax, VA, USA: IOS Press, 2012, pp. 33-44.
-
(2012)
Radio Frequency Identification System Security
, vol.8
, pp. 33-44
-
-
Xin, W.1
Sun, H.2
Wang, Z.3
Guan, Z.4
Chen, Z.5
-
22
-
-
84947125022
-
Secure object tracking protocol for networked RFID systems
-
Takamatsu, Japan
-
B. Ray, M. Howdhury, J. Abawajy, and M. Jesmin, "Secure object tracking protocol for networked RFID systems," in Proc. 16th IEEE/ACIS Int. Conf. Softw. Eng. Artif. Intell. Netw. Parallel/Distrib. Comput. (SNPD), Takamatsu, Japan, 2015, pp. 1-7.
-
(2015)
Proc. 16th IEEE/ACIS Int. Conf. Softw. Eng. Artif. Intell. Netw. Parallel/Distrib. Comput. (SNPD)
, pp. 1-7
-
-
Ray, B.1
Howdhury, M.2
Abawajy, J.3
Jesmin, M.4
-
23
-
-
84872334878
-
Performance evaluation of the first commercial PUF-embedded RFID
-
Tokyo, Japan
-
H. Kang, Y. Hori, and A. Satoh, "Performance evaluation of the first commercial PUF-embedded RFID," in Proc. IEEE 1st Global Conf. Consum. Electron. (GCCE), Tokyo, Japan, 2012, pp. 5-8.
-
(2012)
Proc. IEEE 1st Global Conf. Consum. Electron. (GCCE)
, pp. 5-8
-
-
Kang, H.1
Hori, Y.2
Satoh, A.3
-
24
-
-
77957551809
-
Comparative analysis of formal model checking tools for security protocol verification
-
N. Meghanathan, S. Boumerdassi, N. Chaki, and D. Nagamalai, Eds. Heidelberg, Germany: Springer
-
R. Patel et al., "Comparative analysis of formal model checking tools for security protocol verification," in Recent Trends in Network Security and Applications, vol. 89, N. Meghanathan, S. Boumerdassi, N. Chaki, and D. Nagamalai, Eds. Heidelberg, Germany: Springer, 2010, pp. 152-163.
-
(2010)
Recent Trends in Network Security and Applications
, vol.89
, pp. 152-163
-
-
Patel, R.1
-
25
-
-
84964088698
-
-
Dept. Comput. Sci., ETH Zurich, Zürich, Switzerland, Tech. Rep. 572
-
C. Cremers, "Scyther: Unbounded verification of security protocols," Dept. Comput. Sci., ETH Zurich, Zürich, Switzerland, Tech. Rep. 572, 2007.
-
(2007)
Scyther: Unbounded Verification of Security Protocols
-
-
Cremers, C.1
-
26
-
-
67650664414
-
-
Dept. Comput. Sci., Univ. Oxford, Oxford, U.K., Tech. Rep.
-
C. Cremers, "The Scyther tool," Dept. Comput. Sci., Univ. Oxford, Oxford, U.K., Tech. Rep., 2013.
-
(2013)
The Scyther Tool
-
-
Cremers, C.1
-
27
-
-
84982939694
-
Complexity theory
-
E. K. Blum and A. V. Aho, Eds. New York, NY, USA: Springer
-
A. V. Aho, "Complexity theory," in Computer Science: The Hardware, Software and Heart of IT, E. K. Blum and A. V. Aho, Eds. New York, NY, USA: Springer, 2011, pp. 241-267, doi: 10.1007/978-1-4614-1168-0-12.
-
(2011)
Computer Science: The Hardware, Software and Heart of IT
, pp. 241-267
-
-
Aho, A.V.1
|