A Hash-based RFID Search Protocol for Mobile Reader
暂无分享,去创建一个
[1] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[2] Dong Hoon Lee,et al. RFID tag search protocol preserving privacy of mobile reader holders , 2011, IEICE Electron. Express.
[3] Tatsuo Nakajima,et al. Secure and efficient tag searching in RFID systems using serverless search protocol , 2008 .
[4] Ouyang Dantong,et al. A Lightweight RFID Authentication Protocol for Mobile Reader , 2012 .
[5] Yanjun Zuo. Secure and private search protocols for RFID systems , 2010, Inf. Syst. Frontiers.
[6] Hung-Yu Chien,et al. Server‐less RFID authentication and searching protocol with enhanced security , 2012, Int. J. Commun. Syst..
[7] Bo Sheng,et al. Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.
[8] Steven G. Johnson,et al. The Design and Implementation of FFTW3 , 2005, Proceedings of the IEEE.
[9] Jong Hyuk Park,et al. Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments , 2010, Wirel. Pers. Commun..
[10] Myunghee Son,et al. Design and implementation of mobile RFID technology in the CDMA networks , 2006, 2006 8th International Conference Advanced Communication Technology.
[11] Howon Kim,et al. Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems , 2006, 2006 IEEE International Symposium on Consumer Electronics.
[12] Dong Hoon Lee,et al. Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[13] L. Sydanheimo,et al. Use and interface definition of mobile RFID reader integrated in a smart phone , 2005, Proceedings of the Ninth International Symposium on Consumer Electronics, 2005. (ISCE 2005)..
[14] S.I. Ahamed,et al. S3PR: Secure Serverless Search Protocols for RFID , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[15] Foreword and Editorial International Journal of Hybrid Information Technology , 2022 .
[16] Ouyang Dantong,et al. An Efficient Lightweight RFID Authentication Protocol for Low-cost Tags , 2011 .