A radio frequency identification application for car theft prevention in parking lot management systems
暂无分享,去创建一个
[1] Ari Juels,et al. RFID: security and privacy for five-cent wireless devices (abstract only) , 2004, WiSe '04.
[2] S. Stankovski,et al. Implementation of RFID Technology in Parking Lot Access Control System , 2007, 2007 1st Annual RFID Eurasia.
[3] Yulin Zhang,et al. A design of bi-verification vehicle access intelligent control system based on RFID , 2009, 2009 9th International Conference on Electronic Measurement & Instruments.
[4] Chin-Ling Chen,et al. Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection , 2009, Eng. Appl. Artif. Intell..
[5] Chin-Ling Chen,et al. An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards , 2014, Secur. Commun. Networks.
[6] Kouichi Sakurai,et al. Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[7] Daesung Kwon,et al. Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards , 2009, Comput. Stand. Interfaces.
[8] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[9] Chin-Ling Chen,et al. Using RFID Yoking Proof Protocol to Enhance Inpatient Medication Safety , 2012, Journal of Medical Systems.
[10] Kwangjo Kim,et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .
[11] Mikhail Nesterenko,et al. RFID security without extensive cryptography , 2005, SASN '05.
[12] Hung-Yu Chien,et al. Server‐less RFID authentication and searching protocol with enhanced security , 2012, Int. J. Commun. Syst..
[13] Wei-Kuan Shih,et al. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment , 2009, Comput. Stand. Interfaces.
[14] W. W. Peterson,et al. Cyclic Codes for Error Detection , 1961, Proceedings of the IRE.
[15] Soo-Young Kang,et al. A study on secure RFID mutual authentication scheme in pervasive computing environment , 2008, Comput. Commun..
[16] Jian Huang,et al. An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.
[17] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[18] Jung-Shian Li,et al. A hidden mutual authentication protocol for low-cost RFID tags , 2011, Int. J. Commun. Syst..
[19] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[20] N. Inanc,et al. Smart Parking Applications Using RFID Technology , 2007, 2007 1st Annual RFID Eurasia.
[21] Jung-Hui Chiu,et al. Select-Response Grouping Proof for RFID Tags , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.