A HMAC-Based RFID Authentication Protocol
暂无分享,去创建一个
Ya-ling Zhang | Shang-ping Wang | Qiao-mei Ma | You-sheng Li | Ya-ling Zhang | Shang-ping Wang | Qiao-mei Ma | You-sheng Li
[1] Jian Huang,et al. An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.
[2] Yu Cheng-fang. An Anti-Collision RFID Algorithm Based on the Dynamic Binary , 2005 .
[3] Dongho Won,et al. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.
[4] Li Jintao,et al. Research on Hash-Based RFID Security Authentication Protocol , 2009 .
[5] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[6] Y.-C. Lee,et al. An Improvement on RFID Authentication Protocol with Privacy Protection , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[7] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[8] Min-Shiang Hwang,et al. RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection , 2007, The 9th International Conference on Advanced Communication Technology.