Research on RFID Information Security Technology Based on Elliptic Curve Algorithms
暂无分享,去创建一个
[1] Ingrid Verbauwhede,et al. Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.
[2] Kinjal Mehta,et al. A Survey on Elliptic Curve Cryptography , 2015 .
[3] Sonali U. Nimbhorkar,et al. Multilevel Secure RFID Based Object Tracking System , 2016 .
[4] Tim Kerins,et al. Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[5] Zurina Mohd Hanapi,et al. Comparison of ECC and RSA Algorithm in Resource Constrained Devices , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).
[6] Ingrid Verbauwhede,et al. Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs , 2012, Personal and Ubiquitous Computing.
[7] Li Yin,et al. The design of an RFID security protocol based on RSA signature for e-ticket , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.
[8] Sébastien Canard,et al. Low-Cost Cryptography for Privacy in RFID Systems , 2006, CARDIS.
[9] H. K. Srivastava,et al. Performance Based Comparison Study of RSA and Elliptic Curve Cryptography , 2013 .