A secure ownership transfer protocol using EPCglobal Gen-2 RFID
暂无分享,去创建一个
Jehn-Ruey Jiang | Chin-Ling Chen | Yu-Chung Huang | Chin-Ling Chen | Jehn-Ruey Jiang | Yu-Chung Huang
[1] Wei Guo,et al. Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network , 2013, Telecommun. Syst..
[2] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[3] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[4] Yeong-Lin Lai,et al. A smart card-based mobile secure transaction system for medical treatment examination reports , 2011 .
[5] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[6] Mikhail Nesterenko,et al. RFID security without extensive cryptography , 2005, SASN '05.
[7] Kwangjo Kim,et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .
[8] Chin-Ling Chen,et al. Group-Based Authentication to Protect Digital Content for Business Applications , 2009 .
[9] Kwangjo Kim,et al. A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags , 2007 .
[10] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[11] Adrian Perrig,et al. Proceedings of the 2nd ACM workshop on Wireless security , 2003 .
[12] Peris-LopezPedro,et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard , 2009 .
[13] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[14] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[15] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[16] Dong Hoon Lee,et al. Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems , 2009, Comput. Stand. Interfaces.
[17] Juan E. Tapiador,et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard , 2009, Comput. Stand. Interfaces.
[18] Xuemei Liu,et al. Evaluating the energy consumption of the RFID tag collision resolution protocols , 2013, Telecommun. Syst..
[19] Tsuyoshi Takagi,et al. An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.
[20] Chin-Ling Chen,et al. Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection , 2009, Eng. Appl. Artif. Intell..
[21] Rolf Kraemer,et al. A hardware accelerated implementation of the IEEE 802.15.3 MAC protocol , 2007, WSAN.
[22] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.