Anonymous Yoking-Group Proofs
暂无分享,去创建一个
[1] Mike Burmester,et al. Provably Secure Grouping-proofs for RFID tags , 2008, IACR Cryptol. ePrint Arch..
[2] L. Bolotnyy,et al. Generalized "Yoking-Proofs" for a Group of RFID Tags , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.
[3] Robert H. Deng,et al. Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols , 2008, J. Softw..
[4] Cheng-Yuan Ku,et al. A RFID Grouping Proof Protocol for Medication Safety of Inpatient , 2009, Journal of Medical Systems.
[5] Kwangjo Kim,et al. Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction , 2009, IACR Cryptol. ePrint Arch..
[6] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[7] Ingrid Verbauwhede,et al. Wide-Weak Privacy-Preserving RFID Authentication Protocols , 2010, MOBILIGHT.
[8] Leonid Bolotnyy,et al. Generalized "Yoking-Proofs" for a Group of RFID Tags , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.
[9] Laurence T. Yang,et al. Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.
[10] Ingrid Verbauwhede,et al. Low-cost untraceable authentication protocols for RFID , 2010, WiSec '10.
[11] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[12] Kouichi Sakurai,et al. Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[13] T. Sejnowski,et al. RFID authentication protocol for low-cost tags , 2001 .
[14] Ingrid Verbauwhede,et al. Privacy-Preserving ECC-Based Grouping Proofs for RFID , 2010, ISC.
[15] Mike Burmester,et al. Lightweight RFID authentication with forward and backward security , 2011, TSEC.
[16] Jung-Hui Chiu,et al. Reading order independent grouping proof for RFID tags , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[17] Mike Burmester,et al. Distributed Group Authentication for RFID Supply Management , 2013, IACR Cryptol. ePrint Arch..
[18] Juan E. Tapiador,et al. Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[19] Julio César Hernández Castro,et al. Flaws on RFID grouping-proofs. Guidelines for future sound protocols , 2011, J. Netw. Comput. Appl..
[20] Ingrid Verbauwhede,et al. Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs , 2012, Personal and Ubiquitous Computing.
[21] Roel Peeters,et al. Private Yoking Proofs: Attacks, Models and New Provable Constructions , 2012, RFIDSec.
[22] Hung-Yu Chien,et al. Two RFID-based Solutions to Enhance Inpatient Medication Safety , 2011, Journal of Medical Systems.