An Anonymity and Authentication Mechanism for Internet of Things
暂无分享,去创建一个
Xingming Sun | Xiaoliang Wang | Hengfu Yang | Saeed Arif Shah | Xingming Sun | Hengfu Yang | Xiaoliang Wang
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[3] Dong Wang,et al. Impact of RFID Technology on Tracking of Export Goods in Kenya , 2010, J. Convergence Inf. Technol..
[4] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] Srijith Krishnan Nair,et al. Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.
[6] Holger Ziekow. In-Network Event Processing in a Peer to Peer Broker Network for the Internet of Things , 2007, OTM Workshops.
[7] Yuanbo Guo,et al. Security Improvement in Authentication Protocol for Gen-2 Based RFID System , 2011 .
[8] Marit Hansen,et al. Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..
[9] Jaemin Park,et al. A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 Tag , 2007, Future Generation Communication and Networking (FGCN 2007).
[10] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[11] Oliver Günther,et al. Distributed ONS and its Impact on Privacy , 2007, 2007 IEEE International Conference on Communications.
[12] Amardeo Sarma,et al. Identities in the Future Internet of Things , 2009, Wirel. Pers. Commun..
[13] J. Mitsugi,et al. A Tamper Detection Method for RFID Tag Data , 2008, 2008 IEEE International Conference on RFID.
[14] Christian Floerkemeier,et al. RFID Application Development With the Accada Middleware Platform , 2007, IEEE Systems Journal.
[15] Sébastien Canard,et al. Low-Cost Cryptography for Privacy in RFID Systems , 2006, CARDIS.
[16] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[17] Dong Hoon Lee,et al. Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems , 2009, Comput. Stand. Interfaces.
[18] Vladimir Oleshchuk,et al. Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.
[19] Dong Wang,et al. Use of RFID for Intelligent Pre-shipment Inspection , 2010, J. Digit. Content Technol. its Appl..
[20] Olivier Savry,et al. Security and Privacy Protection of Contactless Devices , 2010 .
[21] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.