Fast and Scalable Counterfeits Estimation for Large-Scale RFID Systems
暂无分享,去创建一个
Ivan Stojmenovic | Amiya Nayak | Wei Gong | Kebin Liu | Haoxiang Liu | I. Stojmenovic | Wei Gong | A. Nayak | Haoxiang Liu | Kebin Liu
[1] Lawrence G. Roberts,et al. ALOHA packet system with and without slots and capture , 1975, CCRV.
[2] Lei Yang,et al. Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.
[3] Alex X. Liu,et al. Every bit counts: fast and scalable RFID estimation , 2012, Mobicom '12.
[4] Binbin Chen,et al. Understanding RFID Counting Protocols , 2016, IEEE/ACM Transactions on Networking.
[5] Lei Hu,et al. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[6] Philippe Flajolet,et al. Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..
[7] Rajeev Motwani,et al. Randomized Algorithms , 1995, SIGA.
[8] Wonjun Lee,et al. Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.
[9] Thomas F. La Porta,et al. Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization , 2011, IEEE Transactions on Mobile Computing.
[10] T. Staake,et al. Business strategies in the counterfeit market , 2012 .
[11] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[12] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[13] Rui Zhang,et al. Fast identification of the missing tags in a large RFID system , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[14] Lejla Batina,et al. Untraceable RFID authentication protocols: Revision of EC-RAC , 2009, 2009 IEEE International Conference on RFID.
[15] Thomas F. La Porta,et al. Interference cancellation-based RFID tags identification , 2011, MSWiM '11.
[16] Yunhao Liu,et al. Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..
[17] Mo Li,et al. ZOE: Fast cardinality estimation for large-scale RFID systems , 2013, 2013 Proceedings IEEE INFOCOM.
[18] Chiara Petrioli,et al. Fast identification of mobile RFID tags , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).
[19] P. Bullen. Handbook of means and their inequalities , 1987 .
[20] Mo Li,et al. PET: Probabilistic Estimating Tree for Large-Scale RFID Estimation , 2011, IEEE Transactions on Mobile Computing.
[21] Murali S. Kodialam,et al. Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.
[22] Yunhao Liu,et al. ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.
[23] L. Batina,et al. EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol , 2008, 2008 IEEE International Conference on RFID.
[24] Tassos Dimitriou,et al. A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[25] Bo Sheng,et al. Efficient Continuous Scanning in RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[26] Leonid Bolotnyy,et al. Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[27] John Capetanakis,et al. Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.
[28] Damith C. Ranasinghe,et al. Networked RFID systems , 2008 .
[29] Yunhao Liu,et al. Refresh: Weak Privacy Model for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.