Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
暂无分享,去创建一个
Dongho Won | Seungjoo Kim | Jin Kwak | Keunwoo Rhee | Jin Kwak | Seungjoo Kim | Dongho Won | Keunwoo Rhee
[1] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[2] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[3] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[4] Alorie Gilbert,et al. Wal-Mart cancels 'smart shelf' trial , 2003 .
[5] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[6] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[7] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[8] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[9] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[10] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[11] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[12] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.