S-search: finding RFID tags using scalable and secure search protocol
暂无分享,去创建一个
[1] Ivan Stojmenovic,et al. A hybrid randomized protocol for RFID tag identification , 2006 .
[2] S.I. Ahamed,et al. S3PR: Secure Serverless Search Protocols for RFID , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[3] F. Schoute,et al. Dynamic Frame Length ALOHA , 1983, IEEE Trans. Commun..
[4] Bo Sheng,et al. Severless Search and Authentication Protocols for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[5] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[6] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[7] D. R. Hush,et al. Analysis of tree algorithms for RFID arbitration , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[8] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[9] Harald Vogt,et al. Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.
[10] Bo Sheng,et al. Finding popular categories for RFID tags , 2008, MobiHoc '08.
[11] Anthony Ephremides,et al. An exact analysis and performance evaluation of framed ALOHA with capture , 1989, IEEE Trans. Commun..
[12] J.D. Sandoval,et al. Mathematical model for a multiread anticollision protocol , 2001, 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233).
[13] Martin Feldhofer,et al. A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.
[14] Chae-Woo Lee,et al. An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[15] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[16] Roberto Di Pietro,et al. RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[17] Murali S. Kodialam,et al. Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.
[18] Jae-Hyun Kim,et al. Fast wireless anti-collision algorithm in ubiquitous ID system , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[19] Israel Cidon,et al. Conflict multiplicity estimation and batch resolution algorithms , 1988, IEEE Trans. Inf. Theory.
[20] Jae-Hyun Kim,et al. Novel Anti-collision Algorithms for Fast Object Identification in RFID System , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[21] Francesca Lonetti,et al. Tree slotted aloha: a new protocol for tag identification in RFID networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[22] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[23] Norman Abramson,et al. The ALOHA System-Another Alternative for Computer Communications , 1899 .
[24] Bob Metcalfe,et al. Steady-state analysis of a slotted and controlled Aloha system with blocking , 1975, CCRV.