Design and analysis of secure mechanisms based on tripartite credibility for RFID systems
暂无分享,去创建一个
Xiaofeng Chen | Baojiang Cui | Bing Zhao | Ziyue Wang | B. Zhao | Xiaofeng Chen | Baojiang Cui | Ziyue Wang
[1] Sandra Reeder,et al. Radio Frequency Identification Device (RFID) and Real Time Location Systems (RTLS) Enhance Nursing Care Delivery , 2014 .
[2] Mohammad Umar Siddiqi,et al. Performance evaluation of a secure Low Level Reader Protocol(LLRP) connection , 2009 .
[3] Irfan Syamsuddin,et al. A Survey of RFID Authentication Protocols Based on Hash-Chain Method , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[4] Mohammad Umar Siddiqi,et al. Securing a Low Level Reader Protocol Connection and a Study of its Performance , 2009, 2009 International Conference on Future Computer and Communication.
[5] Elgar Fleisch,et al. RFID Applications: Interfacing with Readers , 2008, IEEE Software.
[6] Wenjin Xu,et al. Research on key Technology of MID , 2010, 2010 Second Pacific-Asia Conference on Circuits, Communications and System.
[7] May Tajima. Strategic value of RFID in supply chain management , 2007 .
[8] Hoopad Mobahat. Authentication and lightweight cryptography in low cost RFID , 2010, 2010 2nd International Conference on Software Technology and Engineering.
[10] Seung-Seok Kang,et al. Design and Implementation of ALE v1.1 Middleware in RFID systems , 2009, 2009 International Conference on New Trends in Information and Service Science.
[11] Yunhao Liu,et al. Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..
[12] Zhang Xiong,et al. An Intelligent RFID Reader and its Application in Airport Baggage Handling System , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[13] Andrew S. Tanenbaum,et al. The evolution of RFID security , 2006, IEEE Pervasive Computing.
[14] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[15] Yanjun Wang,et al. Securing RFID systems conforming to EPC Class 1 Generation 2 standard , 2010, Expert Syst. Appl..
[16] D. Morgan,et al. Accuracy of a radiofrequency identification (RFID) badge system to monitor hand hygiene behavior during routine clinical activities. , 2014, American journal of infection control.
[17] J. Landt,et al. The history of RFID , 2005, IEEE Potentials.
[18] Frédéric Thiesse,et al. LotTrack: RFID-based process control in the semiconductor industry , 2006, IEEE Pervasive Computing.
[19] Paul Müller,et al. Providing Security and Privacy in RFID Systems Using Triggered Hash Chains , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[20] Oum-El-Kheir Aktouf,et al. An Extended LLRP Model for RFID System Test and Diagnosis , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.
[21] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[22] Roy Want,et al. An introduction to RFID technology , 2006, IEEE Pervasive Computing.
[23] Rabab Kreidieh Ward,et al. Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols , 2011, CISIS.
[24] Ciro Cattuto,et al. Dynamics of Person-to-Person Interactions from Distributed RFID Sensor Networks , 2010, PloS one.
[25] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[26] Oum-El-Kheir Aktouf,et al. Monitoring of RFID failures resulting from LLRP misconfigurations , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).