A Survey of RFID Authentication Protocols Based on Hash-Chain Method
暂无分享,去创建一个
Irfan Syamsuddin | Tharam S. Dillon | Song Han | Elizabeth Chang | E. Chang | T. Dillon | Song Han | I. Syamsuddin
[1] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[2] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[3] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[4] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[5] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[6] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[7] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[8] Hartmut Pohl,et al. RFID security , 2004, Inf. Secur. Tech. Rep..
[9] Roy Want,et al. Enabling ubiquitous sensing with RFID , 2004, Computer.
[10] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[11] Dongho Won,et al. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.
[12] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[13] Philippe Oechslin,et al. RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.
[14] Dong Hoon Lee,et al. Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.
[15] Kwangjo Kim,et al. RFID mutual Authentication Scheme based on Synchronized Secret Information , 2006 .
[16] Juan E. Tapiador,et al. RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.
[17] Robert J. Kauffman,et al. Making the ‘MOST’ out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID , 2007, Inf. Technol. Manag..
[18] Tharam S. Dillon,et al. Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database , 2007, MSN.
[19] Song Han,et al. Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor , 2007, ICCSA.
[20] Marc Langheinrich,et al. Practical Minimalist Cryptography for RFID Privacy , 2007, IEEE Systems Journal.