Anonymous RFID Authentication for Cloud Services
暂无分享,去创建一个
Mehmet Sabir Kiraz | Muhammed Ali Bingöl | Süleyman Kardaş | Fatih Birinci | M. Kiraz | Fatih Birinci | Süleyman Kardaş
[1] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[2] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[3] Ling Tian,et al. Identity-Based Authentication for Cloud Computing , 2009, CloudCom.
[4] Rasool Jalili,et al. AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[5] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[6] Mike Burmester,et al. Robust, anonymous RFID authentication with constant key-lookup , 2008, ASIACCS '08.
[7] Andrew S. Tanenbaum,et al. The evolution of RFID security , 2006, IEEE Pervasive Computing.
[8] Tim Kerins,et al. Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[9] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[10] C. Chatmon. Secure Anonymous RFID Authentication Protocols , 2022 .
[11] Refik Molva,et al. PSP: private and secure payment with RFID , 2009, WPES '09.
[12] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[13] Zhenfu Cao,et al. Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy , 2006, WASA.
[14] Klaus Finkenzeller,et al. Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.
[15] Bing Liang,et al. On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup , 2009, ICISS.
[16] Máire O'Neill,et al. Public Key Cryptography and RFID Tags , 2007, CT-RSA.
[17] Mike Burmester,et al. Universally composable and forward-secure RFID authentication and authenticated key exchange , 2007, ASIACCS '07.
[18] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[19] Jan Camenisch,et al. Anonymous credentials on a standard java card , 2009, CCS.
[20] Frederik Armknecht,et al. Anonymous Authentication for RFID Systems , 2010, RFIDSec.
[21] John Lach,et al. A Sub-0 . 5 V Lattice-Based Public-Key Encryption Scheme for RFID Platforms in 130 nm CMOS , 2011 .
[22] Kevin Fu,et al. Privacy for Public Transportation , 2006, Privacy Enhancing Technologies.
[23] Markus Jakobsson,et al. Authentication in the clouds: a framework and its application to mobile users , 2010, CCSW '10.
[24] Gene Tsudik,et al. Universally Composable RFID Identification and Authentication Protocols , 2009, TSEC.
[25] Piotr K. Tysowski,et al. Towards Secure Communication for Highly Scalable Mobile Applications in Cloud Computing Systems , 2011 .