RFID System Security Using Identity-Based Cryptography
暂无分享,去创建一个
[1] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[2] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[3] Tim Kerins,et al. Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[4] Joonsang Baek,et al. A Survey of Identity-Based Cryptography , 2004 .
[5] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[6] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[7] Sozo Inoue,et al. RFID Privacy Using User-Controllable Uniqueness , 2003 .
[8] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[9] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[12] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[13] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[14] Sandip Sen,et al. Learning and Adaption in Multi-Agent Systems , 2006 .
[15] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.