Active RFID System with Cryptography and Authentication Mechanisms
暂无分享,去创建一个
[1] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[2] Serge Vaudenay. RFID Privacy Based on Public-Key Cryptography , 2006, ICISC.
[3] Juan E. Tapiador,et al. RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.
[4] Dave Evans,et al. Qualifying Information Leakage in Tree-Based Hash Protocols , 2012 .
[5] Tim Kerins,et al. Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[6] Selwyn Piramuthu,et al. Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[7] Patrick Chi-leung Hui,et al. Cryptography and authentication on RFID passive tags for apparel products , 2006, Comput. Ind..
[8] Mike Burmester,et al. Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols , 2006, 2006 Securecomm and Workshops.
[9] Martin Feldhofer,et al. A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.
[10] Andrew S. Tanenbaum,et al. A Platform for RFID Security and Privacy Administration (Awarded Best Paper!) , 2006, LISA.
[11] Ivan Damgård,et al. RFID Security: Tradeoffs between Security and Efficiency , 2008, CT-RSA.
[12] Claude Castelluccia,et al. Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags , 2006, CARDIS.
[13] T. T. Moh,et al. A public key system with signature and master key functions , 1999 .
[14] Bo-Yin Yang,et al. TTS: Rank Attacks in Tame-Like Multivariate PKCs , 2004, IACR Cryptol. ePrint Arch..
[15] Bo-Yin Yang,et al. A More Secure and Efficacious TTS Signature Scheme , 2003, ICISC.
[16] Raphael C.-W. Phan,et al. Privacy of Recent RFID Authentication Protocols , 2008, ISPEC.
[17] Akashi Satoh,et al. A Scalable Dual-Field Elliptic Curve Cryptographic Processor , 2003, IEEE Trans. Computers.
[18] Sandeep Sadanandan,et al. Light Weight Cryptography and Applications , 2008 .
[19] Chen-Mou Cheng,et al. Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems , 2006, SPC.
[20] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[21] John Ayoade,et al. Security implications in RFID and authentication processing framework , 2006, Comput. Secur..
[22] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[23] Whitfield Diffie,et al. Analysis of a Public Key Approach Based on Polynomial Substitution , 1985, CRYPTO.