Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
暂无分享,去创建一个
Yunhao Liu | Lei Hu | Li Lu | Lionel M. Ni | Jinsong Han
[1] Yunhao Liu,et al. Mutual anonymous overlay multicast , 2006, J. Parallel Distributed Comput..
[2] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[3] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[4] Dan Suciu,et al. Physical Access Control for Captured RFID Data , 2007, IEEE Pervasive Computing.
[5] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[6] Philip Robinson,et al. Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments , 2003, SPC.
[7] Tassos Dimitriou,et al. A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[8] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[9] Yingjiu Li,et al. Protecting RFID communications in supply chains , 2007, ASIACCS '07.
[10] Philippe Oechslin,et al. Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.
[11] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[12] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[13] Gildas Avoine. Adversarial Model for Radio Frequency Identification , 2005, IACR Cryptol. ePrint Arch..
[14] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[15] Yunhao Liu,et al. ANDMARC: Indoor Location Sensing Using Active RFID , 2003, PerCom.
[16] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.