Secure and Practical Key Distribution for RFID-Enabled Supply Chains
暂无分享,去创建一个
Yingjiu Li | Tieyan Li | Guilin Wang | Yingjiu Li | Guilin Wang | Tieyan Li
[1] Marc Langheinrich,et al. Practical Minimalist Cryptography for RFID Privacy , 2007, IEEE Systems Journal.
[2] Mihir Bellare,et al. Robust computational secret sharing and a unified account of classical secret-sharing goals , 2007, CCS '07.
[3] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[4] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[5] K. Brown,et al. Graduate Texts in Mathematics , 1982 .
[6] Yingjiu Li,et al. Protecting RFID communications in supply chains , 2007, ASIACCS '07.
[7] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[10] Steven Roman,et al. Coding and information theory , 1992 .
[11] Bryan Parno,et al. Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.