RFID System with Fairness Within the Framework of Security and Privacy
暂无分享,去创建一个
[1] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[2] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[3] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[4] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Dongho Won,et al. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.
[7] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[8] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[9] Philippe Oechslin,et al. RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[12] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[13] Hartmut Pohl,et al. RFID security , 2004, Inf. Secur. Tech. Rep..
[14] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[15] Tom Ahlkvist Scharfeld. An analysis of the fundamental constraints on low cost passive radio-frequency identification system design , 2001 .
[16] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[17] István Vajda,et al. Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .
[18] Christian Cachin. On-Line Secret Sharing , 1995, IMACC.
[19] Dieter Gollmann,et al. Secret Sharing with Reusable Polynomials , 1997, ACISP.
[20] Daniel W. Engels,et al. The reader collision problem , 2002, IEEE International Conference on Systems, Man and Cybernetics.