A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function
暂无分享,去创建一个
Jie Ding | Feng Zhu | Peng Li | Ruchuan Wang | He Xu | He Xu | Peng Li | Ruchuan Wang | F. Zhu | J. Ding
[1] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[2] Masoud Hadian Dehkordi,et al. Improvement of the Hash-Based RFID Mutual Authentication Protocol , 2014, Wirel. Pers. Commun..
[3] Da-Zhi Sun,et al. Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol , 2016, Wirel. Pers. Commun..
[4] Maurizio Rebaudengo,et al. A novel simulator for RFID reader-to-reader anti-collision protocols , 2015, 2015 International EURASIP Workshop on RFID Technology (EURFID).
[5] Xiaojun Zhang,et al. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety , 2015, Journal of Medical Systems.
[6] Chimay J. Anumba,et al. Radio-Frequency Identification (RFID) applications: A brief introduction , 2007, Adv. Eng. Informatics.
[7] Davide Zanetti,et al. Privacy-preserving clone detection for RFID-enabled supply chains , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).
[8] Sándor Imre,et al. Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems , 2012, EUNICE.
[9] Derek Abbott,et al. Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[10] Alfredo De Santis,et al. On Ultralightweight RFID Authentication Protocols , 2011, IEEE Transactions on Dependable and Secure Computing.
[11] JaeCheol Ha,et al. Low-Cost and Strong-Security RFID Authentication Protocol , 2007, EUC Workshops.
[12] Ching-Hsien Hsu,et al. Efficient identity authentication and encryption technique for high throughput RFID system , 2016, Secur. Commun. Networks.
[13] Katina Michael,et al. RFID and Supply Chain Management: Introduction to the Special Issue , 2008, J. Theor. Appl. Electron. Commer. Res..
[14] Hideyoshi Harashima,et al. Enhanced antigen presentation and CTL activity by transduction of mature rather than immature dendritic cells with octaarginine-modified liposomes. , 2009, Journal of controlled release : official journal of the Controlled Release Society.
[15] Mete Akgün,et al. Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems , 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications.
[16] Yong Guan,et al. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[17] Alessandro Perego,et al. A quantitative model for the introduction of RFId in the fast moving consumer goods supply chain: Are there any profits? , 2009 .
[18] B. B. Gupta,et al. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.
[19] Maode Ma,et al. An ultralightweight RFID authentication protocol with CRC and permutation , 2014, J. Netw. Comput. Appl..
[20] Biplob Ray,et al. PUF-based secure checker protocol for Networked RFID Systems , 2014, 2014 IEEE Conference on Open Systems (ICOS).
[21] Elgar Fleisch,et al. How to detect cloned tags in a reliable way from incomplete RFID traces , 2009, 2009 IEEE International Conference on RFID.
[22] Nemai Chandra Karmakar,et al. Introduction of electromagnetic image-based chipless RFID system , 2013, 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[23] Zhihua Wang,et al. A Low-Cost UHF RFID System With OCA Tag for Short-Range Communication , 2015, IEEE Transactions on Industrial Electronics.
[24] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[25] Katina Michael,et al. RFID - A Unique Radio Innovation for the 21st Century , 2010, Proc. IEEE.
[26] Roy Want,et al. An introduction to RFID technology , 2006, IEEE Pervasive Computing.