An aggregated signature-based fast RFID batch detection protocol
暂无分享,去创建一个
[1] Bo Sheng,et al. How to Monitor for Missing RFID tags , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[2] Yunhao Liu,et al. ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.
[3] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[4] Kwangjo Kim,et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .
[5] Shigang Chen,et al. Privacy-preserving RFID authentication based on cryptographical encoding , 2012, 2012 Proceedings IEEE INFOCOM.
[6] Guojun Wang,et al. A Light-Weight Commodity Integrity Detection Algorithm Based on Chinese Remainder Theorem , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[7] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[8] Tassos Dimitriou,et al. A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[9] Murali S. Kodialam,et al. Anonymous Tracking Using RFID Tags , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[10] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[11] Bo Sheng,et al. Counting RFID Tags Efficiently and Anonymously , 2010, 2010 Proceedings IEEE INFOCOM.
[12] Yong Guan,et al. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[13] Yingjiu Li,et al. Protecting RFID communications in supply chains , 2007, ASIACCS '07.
[14] Yunhao Liu,et al. Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[15] Shiping Chen,et al. Efficient missing tag detection in RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.
[16] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[17] Yunhao Liu,et al. Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[18] Chin-Ling Chen,et al. An Ownership Transfer Scheme Using Mobile RFIDs , 2013, Wirel. Pers. Commun..
[19] Dan Suciu,et al. Physical Access Control for Captured RFID Data , 2007, IEEE Pervasive Computing.
[20] Fadhel M. Ghannouchi,et al. Geometry-Based Doppler Analysis for GPS Receivers , 2013, Wirel. Pers. Commun..
[21] Selwyn Piramuthu,et al. Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols , 2009, 2009 First International Conference on Networks & Communications.
[22] Yunhao Liu,et al. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.
[23] Bo Sheng,et al. Finding popular categories for RFID tags , 2008, MobiHoc '08.