Data Verification in Integrated RFID Systems
暂无分享,去创建一个
[1] Marianne Winslett,et al. Regulatory-Compliant Data Management , 2007, VLDB.
[2] Lei Hu,et al. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[3] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[4] Hua Lu,et al. An RFID and particle filter-based indoor spatial query evaluation system , 2013, EDBT '13.
[5] Ngoc-Tu Nguyen,et al. A dynamic-range-based algorithm for reader-tag collision avoidance deployment in RFID networks , 2016, 2016 International Conference on Electronics, Information, and Communications (ICEIC).
[6] Marco Zuniga,et al. On optimal tag placement for indoor localization , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.
[7] Tadayoshi Kohno,et al. RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications , 2008, CCS.
[8] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[9] Kazuya Sakai,et al. Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel , 2013, IEEE Transactions on Computers.
[10] Ninghui Li,et al. WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance , 2009, ESORICS.
[11] N. Asokan,et al. Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[12] Satoshi Fukumoto,et al. Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems , 2016, WASA.
[13] Haixun Wang,et al. A Bayesian Inference-Based Framework for RFID Data Cleansing , 2013, IEEE Transactions on Knowledge and Data Engineering.
[14] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[15] Dominique Schröder,et al. Verifiable data streaming , 2012, CCS.
[16] Athanasios V. Vasilakos,et al. Private and Secure Tag Access for Large-Scale RFID Systems , 2016, IEEE Transactions on Dependable and Secure Computing.
[17] Michael T. Goodrich,et al. On the Cost of Persistence and Authentication in Skip Lists , 2007, WEA.
[18] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[19] Hui-Mei Wang,et al. Privacy-Preserving k-Nearest Neighbor Computation in Multiple Cloud Environments , 2016, IEEE Access.
[20] Elisa Bertino,et al. No one can track you: Randomized authentication in Vehicular Ad-hoc Networks , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[21] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[22] Roberto Tamassia,et al. Authenticated hash tables , 2008, CCS.
[23] Wei-Shinn Ku,et al. A Novel Coding Scheme for Secure Communications in Distributed RFID Systems , 2016, IEEE Transactions on Computers.
[24] Ngoc-Tu Nguyen,et al. A Maximum-Weight-Independent-Set-Based Algorithm for Reader-Coverage Collision Avoidance Arrangement in RFID Networks , 2016, IEEE Sensors Journal.
[25] Sheikh Iqbal Ahamed,et al. AnonPri: A secure anonymous private authentication protocol for RFID systems , 2017, Inf. Sci..