Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption
暂无分享,去创建一个
[1] Dongho Won,et al. WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment , 2006, APWeb Workshops.
[2] Dongho Won,et al. Security Analysis and Implementation Leveraging Globally Networked RFIDs , 2006, PWC.
[3] Toshiaki Tanaka,et al. A New (k, n)-Threshold Secret Sharing Scheme and Its Extension , 2008, ISC.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Toshiaki Tanaka,et al. A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[6] Minglu Li,et al. Advanced Web and Network Technologies, and Applications , 2006 .
[7] Krishna M. Sivalingam,et al. Power-aware scheduling algoritms for wire-less networks , 2001 .
[8] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[9] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[10] Hiraku Okada,et al. Technical Report of IEICE , 2000 .
[11] Y. Fujii,et al. A fast (2,n)-threshold scheme and its application , 2005 .