An enhanced authentication scheme in mobile RFID system
暂无分享,去创建一个
[1] Wanlei Zhou,et al. A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems , 2013, Ad Hoc Networks.
[2] Dharma P. Agrawal,et al. Choices for interaction with things on Internet and underlying issues , 2015, Ad Hoc Networks.
[3] Maryline Laurent-Maknavicius,et al. Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.
[4] Alex X. Liu,et al. PAP: A privacy and authentication protocol for passive RFID tags , 2009, Comput. Commun..
[5] Sang-Soo Yeo,et al. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..
[6] Nathalie Mitton,et al. How to choose an experimentation platform for wireless sensor networks? A survey on static and mobile wireless sensor network experimentation facilities , 2015, Ad Hoc Networks.
[7] Ruhul Amin,et al. A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS , 2015, Journal of Medical Systems.
[8] M. Ufuk Çaglayan,et al. Providing destructive privacy and scalability in RFID systems using PUFs , 2015, Ad Hoc Networks.
[9] Chien-Hung Wu,et al. Improvement of the RFID authentication scheme based on quadratic residues , 2011, Comput. Commun..
[10] Sourav Mukhopadhyay,et al. A secure password-based authentication and key agreement scheme using smart cards , 2015, J. Inf. Secur. Appl..
[11] Vijay V. Vazirani,et al. Efficient and Secure Pseudo-Random Number Generation (Extended Abstract) , 1984, FOCS.
[12] Chih-Ming Hsiao,et al. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.
[13] Chin-Ling Chen,et al. A Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards , 2012, Inf. Technol. Control..
[14] Debashis De,et al. A novel pseudo random number generator based cryptographic architecture using quantum-dot cellular automata , 2016, Microprocess. Microsystems.
[15] Hung-Min Sun,et al. Improvement of a novel mutual authentication scheme based on quadratic residues for RFID systems , 2008, 2009 Joint Conferences on Pervasive Computing (JCPC).
[16] Junqiang Liu,et al. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment , 2016, Journal of Medical Systems.
[17] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[18] Kenneth H. Rosen. Elementary Number Theory: And Its Applications , 2010 .
[19] Chin-Ling Chen,et al. Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection , 2009, Eng. Appl. Artif. Intell..
[20] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[21] Ruhul Amin,et al. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity , 2015, Journal of Medical Systems.