A vector-space-based lightweight RFID authentication protocol
暂无分享,去创建一个
[1] Aikaterini Mitrokotsa,et al. Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.
[2] Kai-Ping Chang,et al. Lightweight and Serverless RFID Authentication and Search Protocol , 2009, 2009 Second International Conference on Computer and Electrical Engineering.
[3] Hung-Yu Chien,et al. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.
[4] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[5] Juan E. Tapiador,et al. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol , 2009, WISA.
[6] Satya Bagchi,et al. A Secure PUF-Based Unilateral Authentication Scheme for RFID System , 2018, Wirel. Pers. Commun..
[7] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[8] Raphael C.-W. Phan,et al. Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI , 2009, IEEE Transactions on Dependable and Secure Computing.
[9] Ramjee Prasad,et al. Identity driven capability based access control (ICAC) scheme for the Internet of Things , 2012, 2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS).
[10] Y.-C. Lee,et al. A New Ultralightweight RFID Protocol with Mutual Authentication , 2009, 2009 WASE International Conference on Information Engineering.
[11] Hung-Yu Chien,et al. Server‐less RFID authentication and searching protocol with enhanced security , 2012, Int. J. Commun. Syst..
[12] Marc Langheinrich,et al. A survey of RFID privacy approaches , 2009, Personal and Ubiquitous Computing.
[13] Wanlei Zhou,et al. A minimum disclosure approach to authentication and privacy in RFID systems , 2012, Comput. Networks.
[14] Mohammad Reza Aref,et al. Desynchronization attack on RAPP ultralightweight authentication protocol , 2013, Inf. Process. Lett..
[15] Masoumeh Safkhani,et al. Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP , 2014, Secur. Commun. Networks.
[16] Hamid Mala,et al. Security analysis of an ultra‐lightweight RFID authentication protocol for m‐commerce , 2018, IACR Cryptol. ePrint Arch..
[17] Kai Fan,et al. An ultra-lightweight RFID authentication scheme for mobile commerce , 2017, Peer-to-Peer Netw. Appl..
[18] Satya Bagchi,et al. Cyclic group based mutual authentication protocol for RFID system , 2020, Wirel. Networks.
[19] Yun Tian,et al. A New Ultralightweight RFID Authentication Protocol with Permutation , 2012, IEEE Communications Letters.
[20] Levente Buttyán,et al. Group-Based Private Authentication , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[21] Mike Burmester,et al. Universally composable and forward-secure RFID authentication and authenticated key exchange , 2007, ASIACCS '07.
[22] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[23] Sheikh Iqbal Ahamed,et al. ERAP: ECC Based RFID Authentication Protocol , 2008, 2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems.
[24] Juan E. Tapiador,et al. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.
[25] Ramjee Prasad,et al. Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[26] Wen Yao,et al. The Adoption and Implementation of RFID Technologies in Healthcare: A Literature Review , 2012, Journal of Medical Systems.
[27] Maryline Laurent-Maknavicius,et al. Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers , 2016, IET Inf. Secur..
[28] Bo Sheng,et al. Severless Search and Authentication Protocols for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).