Batch Clone Detection in RFID-enabled supply chain
暂无分享,去创建一个
[1] Srdjan Capkun,et al. Tailing RFID Tags for Clone Detection , 2013, NDSS.
[2] Yingjiu Li,et al. Secure and Practical Key Distribution for RFID-Enabled Supply Chains , 2011, SecureComm.
[3] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[4] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[5] Jacky Hartnett,et al. Deckard: A System to Detect Change of RFID Tag Ownership , 2007 .
[6] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[7] Tim Kerins,et al. An Elliptic Curve Processor Suitable For RFID-Tags , 2006, IACR Cryptol. ePrint Arch..
[8] Lei Yang,et al. Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.
[9] Florian Kerschbaum,et al. Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting , 2010, RFIDSec.
[10] Elgar Fleisch,et al. Probabilistic Approach for Location-Based Authentication , 2007 .
[11] Florian Michahelles,et al. Securing RFID Systems by Detecting Tag Cloning , 2009, Pervasive.
[12] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[13] Elisa Bertino,et al. RFID Security and Privacy , 2013, Synthesis Lectures on Information Security, Privacy, and Trust.
[14] Sandra Dominikus,et al. Symmetric Authentication for RFID Systems in Practice , 2005 .
[15] Davide Zanetti,et al. Privacy-preserving clone detection for RFID-enabled supply chains , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).
[16] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[17] Bryan Parno,et al. Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.
[18] Frédéric Thiesse,et al. Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.
[19] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[20] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[21] Jun Murai,et al. Group coding of RF tags to verify the integrity of group of objects , 2011, 2011 IEEE International Conference on RFID.