Applying HMAC to Enhance Information Security for Mobile Reader RFID System
暂无分享,去创建一个
[1] Bernard Eydt,et al. Guidelines for Securing Radio Frequency Identification (RFID) Systems | NIST , 2007 .
[2] Athanasios T. Karygiannis,et al. SP 800-98. Guidelines for Securing Radio Frequency Identification (RFID) Systems , 2007 .
[3] David Taniar,et al. Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I , 2006, ICCSA.
[4] Jian Huang,et al. An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.
[5] Ding Zhen-hua,et al. A taxonomy model of RFID security threats , 2008, 2008 11th IEEE International Conference on Communication Technology.
[6] Soo-Young Kang,et al. A Study on New Low-Cost RFID System with Mutual Authentication Scheme in Ubiquitous , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).
[7] Andrew S. Tanenbaum,et al. The evolution of RFID security , 2006, IEEE Pervasive Computing.
[8] Ming-Chang Tsai,et al. Design and implementation of a RFID-based power meter and outage recording system , 2008, 2008 IEEE International Conference on Sustainable Energy Technologies.
[9] Tzong-Dar Wu,et al. Information security on RFID based power meter system , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.
[10] Hung-Yu Chien,et al. Secure Access Control Schemes for RFID Systems with Anonymity , 2006, 7th International Conference on Mobile Data Management (MDM'06).
[11] Vidyasagar Potdar,et al. A Critical Analysis of RFID Security Protocols , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[12] C. Wieser,et al. An Enumeration of RFID Related Threats , 2008, 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.
[13] Jia Zhai,et al. Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure , 2006, ICCSA.
[14] Mei-Yu Wu,et al. Applying Context-Aware RBAC to RFID Security Management for Application in Retail Business , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[15] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.