Analysis and evaluation of three methods for tag identification in OSK RFID protocol
暂无分享,去创建一个
[1] Hsin-Lung Wu,et al. On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[2] Violeta Tomašević,et al. Time-Memory Trade-Off in RFID Systems , 2016 .
[3] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[4] Fu Chun-chang. Hash-based RFID mutual authentication protocol , 2012 .
[5] Lei Zhang,et al. A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography , 2018, Wirel. Pers. Commun..
[6] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[7] Mandeep Kaur,et al. RFID Technology Principles, Advantages, Limitations & Its Applications , 2011 .
[8] Violeta Tomašević,et al. Speeding Up Tag Identification in OSK RFID Protocol , 2018, 2018 26th Telecommunications Forum (TELFOR).
[9] Milo Tomasevic,et al. Double Time-Memory Trade-Off in OSK RFID Protocol , 2019, Wirel. Pers. Commun..
[10] Milo Tomasevic,et al. An analysis of chain characteristics in the cryptanalytic TMTO method , 2013, Theor. Comput. Sci..
[11] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[12] Irfan Syamsuddin,et al. A Survey of RFID Authentication Protocols Based on Hash-Chain Method , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[13] Kwangho Jung,et al. A systematic review of RFID applications and diffusion: key areas and public policy issues , 2015, Journal of Open Innovation: Technology, Market, and Complexity.
[14] Gildas Avoine,et al. Analysis of Rainbow Tables with Fingerprints , 2015, ACISP.
[15] Gildas Avoine,et al. Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography , 2013, IEEE Transactions on Mobile Computing.
[16] Xu Zhuang,et al. Security Issues in Ultralightweight RFID Authentication Protocols , 2018, Wirel. Pers. Commun..