An improved hash-based RFID two-way security authentication protocol and application in remote education
暂无分享,去创建一个
[1] A. Maarof,et al. Security analysis of low cost RFID systems , 2014, 2014 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS).
[2] Jinxing Hu,et al. Managing Big City Information Based on WebVRGIS , 2016, IEEE Access.
[3] Zhihan Lv,et al. Bigdata Oriented Multimedia Mobile Health Applications , 2016, Journal of Medical Systems.
[4] Xu Ying,et al. Collaborative Multi-hop Routing in Cognitive Wireless Networks , 2015, Wireless Personal Communications.
[5] Marcel Kyas,et al. Security and privacy protocol for emerging smart RFID applications , 2014, 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[6] Zhihan Lv,et al. Game On, Science - How Video Game Technology May Help Biologists Tackle Visualization Challenges , 2013, PloS one.
[7] M. Islam,et al. Cubic spline-based tag estimation method in RFID multi-tags identification process , 2013, Canadian Journal of Electrical and Computer Engineering.
[8] Zhao Xinsheng. Research on RFID Security Authentication Protocol Based on Hash Function , 2011 .
[9] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[10] Xu Zhiqiang,et al. Secure and Private Protocols for Server-less RFID Systems , 2014 .
[11] Jianxiong Zhou,et al. A Real-Time Monitoring System of Industry Carbon Monoxide Based on Wireless Sensor Networks , 2015, Sensors.
[12] Mohammad Tariqul Islam,et al. Theoretical analysis of RFID security protocols , 2014, 2014 IEEE International Conference on Industrial Engineering and Engineering Management.
[13] Sujuan Liu,et al. Security Analysis and Improvement on Two RFID Authentication Protocols , 2015, Wirel. Pers. Commun..
[14] Zhihan Lv,et al. A Self-Assessment Stereo Capture Model Applicable to the Internet of Things , 2015, Sensors.
[15] Shang Yu,et al. An Efficient RFID Authentication Protocol Supporting Tag Ownership Transfer , 2012 .
[16] Catherine A. Meadows. Formal Analysis of Cryptographic Protocols , 2011, Encyclopedia of Cryptography and Security.
[17] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.