Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV
暂无分享,去创建一个
Kai Fan | Hui Li | Yintang Yang | Wei Jiang | Wei Wang | Hui Li | K. Fan | Wei-Qiang Jiang | Wei Wang | Yintang Yang
[1] Jie Li,et al. RSEL: revocable secure efficient lightweight RFID authentication scheme , 2014, Concurr. Comput. Pract. Exp..
[2] Philippe Oechslin,et al. RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.
[3] Yuezhi Zhou. Transparent computing: From concept to implementation , 2012, 2012 International Symposium on Information Technologies in Medicine and Education.
[4] Bo Sheng,et al. Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.
[5] Dong Hoon Lee,et al. Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.
[6] Juan E. Tapiador,et al. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.
[7] Di Ma,et al. A Context-Aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection Systems , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[8] Tao Li,et al. An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.
[9] Laurence T. Yang,et al. Information security underlying transparent computing: Impacts, visions and challenges , 2010, Web Intell. Agent Syst..
[10] Tieyan Li,et al. Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols , 2007, SEC.
[11] Liu Shufen,et al. Security Threats And Security Policy In Wireless Sensor Networks , 2012 .
[12] Daniele Catteddu,et al. Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .
[13] Jian Liu,et al. Research and Development of Intelligent Motor Test System , 2012, J. Comput..
[14] Xun Wang,et al. Design of School Bus Safety Regulation System Based on the Internet of Vehicle Technology , 2012 .
[15] Iuon-Chang Lin,et al. A Cloud-Based Authentication Protocol for RFID Supply Chain Systems , 2014, Journal of Network and Systems Management.
[16] Kwangjo Kim,et al. RFID mutual Authentication Scheme based on Synchronized Secret Information , 2006 .
[17] Shih-Jung Wu,et al. An Integrated Building Fire Evacuation System with RFID and Cloud Computing , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[18] Yi Yang,et al. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[19] Hengliang Shi,et al. Development of Internet of Vehicle's Information System based on Cloud , 2014, J. Softw..
[20] Yonghua Xiong,et al. Mobile Transparent Computing to Enable Ubiquitous Operating Systems and Applications , 2014, J. Adv. Comput. Intell. Intell. Informatics.
[21] Sheikh Iqbal Ahamed,et al. Privacy in Pervasive Computing and Open Issues , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[22] Chen Liang,et al. Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G , 2016, Secur. Commun. Networks.
[23] Hongwei Li,et al. Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.
[24] Yuezhi Zhou,et al. Transparent Computing: A New Paradigm for Pervasive Computing , 2006, UIC.
[25] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[26] Lin Hong-lian. Survey on Internet of vehicle technology , 2014 .
[27] Yaoxue Zhang,et al. TransOS: a transparent computing-based operating system for the cloud , 2012, Int. J. Cloud Comput..
[28] Xiaohui Liang,et al. EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid , 2014, IEEE Transactions on Parallel and Distributed Systems.
[29] Keith Mayes,et al. Secure Improved Cloud-Based RFID Authentication Protocol , 2014, DPM/SETOP/QASA.
[30] Chen Zhang,et al. Cloud-based RFID authentication , 2013, 2013 IEEE International Conference on RFID (RFID).
[31] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[32] Wentao Liu,et al. Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[33] Yi Chai,et al. The Paradigm of Big Data for Augmenting Internet of Vehicle into the Intelligent Cloud Computing Systems , 2014, IOV.
[34] Fuquan Zhao,et al. On the Application Development of 3G Technology in Automobiles , 2013 .