Double Time-Memory Trade-Off in OSK RFID Protocol
暂无分享,去创建一个
[1] Jiang Wu,et al. A Highly Scalable RFID Authentication Protocol , 2009, ACISP.
[2] Flavio D. Garcia,et al. Modeling Privacy for Off-Line RFID Systems , 2010, CARDIS.
[3] Ahmed Khattab,et al. RFID Security Threats and Basic Solutions , 2017 .
[4] Xu Zhuang,et al. Security Issues in Ultralightweight RFID Authentication Protocols , 2018, Wirel. Pers. Commun..
[5] Gildas Avoine,et al. Deploying OSK on Low-Resource Mobile Devices , 2013, RFIDSec.
[6] Irfan Syamsuddin,et al. A Survey of RFID Authentication Protocols Based on Hash-Chain Method , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[7] Sozo Inoue,et al. A Secure High-Speed Identification Scheme for RFID Using Bloom Filters , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[8] Lei Zhang,et al. A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography , 2018, Wirel. Pers. Commun..
[9] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[10] Hsin-Lung Wu,et al. On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[11] Qiang Zhao,et al. RFID ownership transfer protocol based on cloud , 2016, Comput. Networks.
[12] Gildas Avoine,et al. Analysis of Rainbow Tables with Fingerprints , 2015, ACISP.
[13] Wang Bailing,et al. Hash-based RFID Mutual Authentication Protocol , 2013 .
[14] Jian Shen,et al. A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications , 2018, J. Ambient Intell. Humaniz. Comput..
[15] Tania Martin. Privacy in RFID systems , 2013 .
[16] Gildas Avoine,et al. Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography , 2013, IEEE Transactions on Mobile Computing.
[17] Ari Juels,et al. Defining Strong Privacy for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[18] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[19] Enrique Valero,et al. Evolution of RFID Applications in Construction: A Literature Review , 2015, Sensors.
[20] Kwangho Jung,et al. A systematic review of RFID applications and diffusion: key areas and public policy issues , 2015, Journal of Open Innovation: Technology, Market, and Complexity.
[21] Milo Tomasevic,et al. An analysis of chain characteristics in the cryptanalytic TMTO method , 2013, Theor. Comput. Sci..
[22] De Li,et al. Audio Watermarking by Coefficient Quantization in the DWT-DCT Dual Domain , 2013 .
[23] Philippe Oechslin,et al. Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.
[24] Mandeep Kaur,et al. RFID Technology Principles, Advantages, Limitations & Its Applications , 2011 .
[25] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[26] Wei Jiang,et al. Lightweight RFID Protocol for Medical Privacy Protection in IoT , 2018, IEEE Transactions on Industrial Informatics.
[27] Chien-Ming Chen,et al. On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags , 2017, The Journal of Supercomputing.