Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems
暂无分享,去创建一个
Shundong Li | Yimin Guo | Jiawei Dou | Sufang Zhou | Shundong Li | Jiawei Dou | Sufang Zhou | Yimin Guo
[1] Yu Zeng,et al. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision , 2013, IEEE Transactions on Parallel and Distributed Systems.
[2] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[3] Klaus Finkenzeller,et al. Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .
[4] Quanyuan Feng,et al. Stability Analysis of an Efficient Anti-Collision Protocol for RFID Tag Identification , 2012, IEEE Transactions on Communications.
[5] Jemal H. Abawajy. Enhancing RFID Tag Resistance against Cloning Attack , 2009, 2009 Third International Conference on Network and System Security.
[6] XiaoLin Jia,et al. An improved anti‐collision protocol for radio frequency identification tag , 2015, Int. J. Commun. Syst..
[7] Basel Alomair,et al. Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2010, IEEE Transactions on Parallel and Distributed Systems.
[8] Mike Burmester,et al. Lightweight RFID authentication with forward and backward security , 2011, TSEC.
[9] David C. Yen,et al. Taxonomy and survey of RFID anti-collision protocols , 2006, Comput. Commun..
[10] Basel Alomair,et al. Securing low-cost RFID systems: An unconditionally secure approach , 2011, J. Comput. Secur..
[11] Kai Bu,et al. Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems , 2013, IEEE Transactions on Information Forensics and Security.
[12] Byeongchan Jeon,et al. Multiple RFID Tags Identification with M-ary Query Tree Scheme , 2013, IEEE Communications Letters.
[13] Min Young Chung,et al. Identification of RFID Tags in Framed-Slotted ALOHA with Robust Estimation and Binary Selection , 2007, IEEE Communications Letters.
[14] Srdjan Capkun,et al. Tailing RFID Tags for Clone Detection , 2013, NDSS.
[15] Kai Bu,et al. Approaching the time lower bound on cloned-tag identification for large RFID systems , 2014, Ad Hoc Networks.
[16] Florian Michahelles,et al. Securing RFID Systems by Detecting Tag Cloning , 2009, Pervasive.
[17] Wei Zhang,et al. An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree , 2013, Int. J. Distributed Sens. Networks.