-
1
-
-
84894255457
-
An enhanced access control scheme in wireless sensor networks
-
S. Chatterjee, A. K. Das, and J. K. Sing, "An enhanced access control scheme in wireless sensor networks," Ad Hoc & Sensor Wireless Networks, vol. 21, no. 2, pp. 121-149, 2014.
-
(2014)
Ad Hoc & Sensor Wireless Networks
, vol.21
, Issue.2
, pp. 121-149
-
-
Chatterjee, S.1
Das, A.K.2
Sing, J.K.3
-
2
-
-
84935429207
-
The secure transaction protocol in NFC card emulation mode
-
Y. L. Chi, C. H. Chen, and I. C. Lin, "The secure transaction protocol in NFC card emulation mode," IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 4, pp. 431-438, 2015.
-
(2015)
IEEE Transactions on Intelligent Transportation Systems
, vol.17
, Issue.4
, pp. 431-438
-
-
Chi, Y.L.1
Chen, C.H.2
Lin, I.C.3
-
3
-
-
84876136714
-
Conditional privacy preserving security protocol for NFC applications
-
H. Eun, H. Lee, and H. Oh, "Conditional privacy preserving security protocol for NFC applications," IEEE Transactions on Consumer Electronics, vol. 59, no. 1, pp. 153-160, 2013.
-
(2013)
IEEE Transactions on Consumer Electronics
, vol.59
, Issue.1
, pp. 153-160
-
-
Eun, H.1
Lee, H.2
Oh, H.3
-
4
-
-
84863338784
-
Conditional privacy preserving security protocol for NFC applications
-
Las Vegas, NV, Jan
-
H. Eun, H. Lee, J. Son, and S. Kim, "Conditional privacy preserving security protocol for NFC applications," in IEEE International Conference on Consumer Electronics (ICCE'12), pp. 380-381, Las Vegas, NV, Jan. 2012.
-
(2012)
IEEE International Conference on Consumer Electronics (ICCE'12)
, pp. 380-381
-
-
Eun, H.1
Lee, H.2
Son, J.3
Kim, S.4
-
5
-
-
84876134814
-
-
Technical Report, Market Analysis and Statistics, May
-
Gartner, Market Insight: The Outlook on Mobile Payment, Technical Report, Market Analysis and Statistics, May 2010.
-
(2010)
Market Insight: The Outlook on Mobile Payment
-
-
-
6
-
-
84994282850
-
Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks
-
P. Gope and T. L. Hwang, "Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks," IEEE Systems Journal, vol. 99, no. 1, pp. 1-10, 2015.
-
(2015)
IEEE Systems Journal
, vol.99
, Issue.1
, pp. 1-10
-
-
Gope, P.1
Hwang, T.L.2
-
7
-
-
84926037301
-
Secure pseudonym-based near field communication protocol for the consumer internet of things
-
D. He, N. Kumar, and J. H. Lee, "Secure pseudonym-based near field communication protocol for the consumer internet of things," IEEE Transactions on Consumer Electronics, vol. 61, no. 1, pp. 56-62, 2015.
-
(2015)
IEEE Transactions on Consumer Electronics
, vol.61
, Issue.1
, pp. 56-62
-
-
He, D.1
Kumar, N.2
Lee, J.H.3
-
8
-
-
80052372468
-
PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs
-
D. Huang, S. Misra, M. Verma, and G. Xue, "PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs," IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 3, pp. 7336-746, 2011.
-
(2011)
IEEE Transactions on Intelligent Transportation Systems
, vol.12
, Issue.3
, pp. 7336-7746
-
-
Huang, D.1
Misra, S.2
Verma, M.3
Xue, G.4
-
12
-
-
82755161820
-
Securing mobile network prefix provisioning for NEMO based vehicular networks
-
J. H. Lee, J. Chen, and T. Ernst, "Securing mobile network prefix provisioning for NEMO based vehicular networks," Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 170-187, 2012.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.1-2
, pp. 170-187
-
-
Lee, J.H.1
Chen, J.2
Ernst, T.3
-
13
-
-
85014069074
-
Cryptanalysis and improvement of lai's authenticated group key transfer protocol
-
J. Li, S. Li, and Z. Chen, "Cryptanalysis and improvement of lai's authenticated group key transfer protocol," Application Research of Computers, vol. 32, no. 1, pp. 254-257, 2015.
-
(2015)
Application Research of Computers
, vol.32
, Issue.1
, pp. 254-257
-
-
Li, J.1
Li, S.2
Chen, Z.3
-
14
-
-
85014454139
-
Elliptic curve lightweight authentication and key agreement scheme
-
X. Niu, S. Guo, and Y. Wang, "Elliptic curve lightweight authentication and key agreement scheme," Computer Science, vol. 42, no. 1, pp. 137-141, 2015.
-
(2015)
Computer Science
, vol.42
, Issue.1
, pp. 137-141
-
-
Niu, X.1
Guo, S.2
Wang, Y.3
-
15
-
-
84947086841
-
A lightweight RFID security protocol based on elliptic curve crytograph
-
Q. Qian, Y. L. Jia, and R. Zhang, "A lightweight RFID security protocol based on elliptic curve crytograph," International Journal of Network Security, vol. 18, no. 2, pp. 354-361, 2016.
-
(2016)
International Journal of Network Security
, vol.18
, Issue.2
, pp. 354-361
-
-
Qian, Q.1
Jia, Y.L.2
Zhang, R.3
-
16
-
-
84939973365
-
Security analysis and improvement on two RFID authentication protocols
-
S. Wang, S. Liu, and D. Chen, "Security analysis and improvement on two RFID authentication protocols," Wireless Personal Communications, vol. 82, no. 1, pp. 21-33, 2015.
-
(2015)
Wireless Personal Communications
, vol.82
, Issue.1
, pp. 21-33
-
-
Wang, S.1
Liu, S.2
Chen, D.3
-
17
-
-
84894321636
-
An efficient anonymous batch authenticated and key agreement scheme using self-certified public keys in VANETs
-
Xian, Oct
-
X. Wang, Z. Huang, Q. Wen, and H. Zhang, "An efficient anonymous batch authenticated and key agreement scheme using self-certified public keys in VANETs," in IEEE Region 10 Conference on TEN-CON, pp. 1-4, Xian, Oct. 2013.
-
(2013)
IEEE Region 10 Conference on TEN-CON
, pp. 1-4
-
-
Wang, X.1
Huang, Z.2
Wen, Q.3
Zhang, H.4
-
18
-
-
79953083437
-
A mutual authentication protocol for RFID
-
C. H. Wei, M. S. Hwang, and A. Y. H Chin, "A mutual authentication protocol for RFID," IEEE IT Professional, vol. 13, no. 2, pp. 20-24, 2011.
-
(2011)
IEEE IT Professional
, vol.13
, Issue.2
, pp. 20-24
-
-
Wei, C.H.1
Hwang, M.S.2
Chin, A.Y.H.3
-
19
-
-
84866074525
-
An improved authentication protocol for mobile agent device in RFID
-
C. H. Wei, M. S. Hwang, and Y. H. Chin, "An improved authentication protocol for mobile agent device in RFID," International Journal ofNetwork Security, vol. 10, no. 5, pp. 508-520, 2012.
-
(2012)
International Journal ofNetwork Security
, vol.10
, Issue.5
, pp. 508-520
-
-
Wei, C.H.1
Hwang, M.S.2
Chin, Y.H.3
-
20
-
-
85014091308
-
Research on privacy-preserving key technologies of the NFC mobile application system
-
Z. Wu, "Research on privacy-preserving key technologies of the NFC mobile application system," The PLA Information Engineering University, 2012.
-
(2012)
The PLA Information Engineering University
-
-
Wu, Z.1
|