Hierarchical RFID Tag Ownership and Transfer in Supply Chains
暂无分享,去创建一个
[1] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[2] Selwyn Piramuthu,et al. Adaptive knowledge-based system for health care applications with RFID-generated information , 2011, Decis. Support Syst..
[3] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[4] Selwyn Piramuthu,et al. Single RFID Tag Ownership Transfer Protocols , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[5] Selwyn Piramuthu,et al. Multi-tag and multi-owner RFID ownership transfer in supply chains , 2011, Decis. Support Syst..
[6] Selwyn Piramuthu,et al. RFID mutual authentication protocols , 2011, Decis. Support Syst..
[7] Avishai Wool,et al. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[8] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.