Improving the Efficiency of RFID Authentication with Pre-Computation
暂无分享,去创建一个
[1] Vidyasagar Potdar,et al. A Survey of RFID Authentication Protocols , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[2] Pedro Peris-López,et al. LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags , 2006 .
[3] Ding Zhen-hua,et al. A taxonomy model of RFID security threats , 2008, 2008 11th IEEE International Conference on Communication Technology.
[4] Jie Li,et al. An authentication protocol for secure and efficient RFID communication , 2010, 2010 International Conference on Logistics Systems and Intelligent Management (ICLSIM).
[5] Farzana Rahman,et al. YA-SRAP: Yet another serverless RFID authentication protocol , 2008 .
[6] Yunhao Liu,et al. ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.
[7] Kyung Oh Lee,et al. SLAP - A Secure but Light Authentication Protocol for RFID Based on Modular Exponentiation , 2007, International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'07).
[8] Keith Mayes,et al. A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems , 2009, 2009 International Conference on Availability, Reliability and Security.
[9] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[10] Lei Hu,et al. Storage-Awareness: RFID Private Authentication based on Sparse Tree , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[11] Robert H. Deng,et al. Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[12] Basel Alomair,et al. Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2010, IEEE Transactions on Parallel and Distributed Systems.
[13] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[14] N. Thanthry,et al. RFID Security Threats to Consumers: Hype vs. Reality , 2007, 2007 41st Annual IEEE International Carnahan Conference on Security Technology.
[15] Basel Alomair,et al. Privacy versus scalability in radio frequency identification systems , 2010, Comput. Commun..
[16] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[17] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[18] Xiang Zhang,et al. Low Cost Minimal Mutual Authentication Protocol for RFID , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.
[19] Matthias Schumann,et al. RFID – Radio Frequency Identification , 2008, Informatik-Spektrum.
[20] Steven Shepard. RFID: Radio Frequency Identification , 2004 .
[21] Philippe Oechslin,et al. Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.
[22] JaeCheol Ha,et al. LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System , 2006, ICUCT.
[23] Radu Marculescu,et al. Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[24] Mikko Lehtonen,et al. From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .