A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets
暂无分享,去创建一个
[1] Sebastian Mödersheim,et al. A Formal Model of Identity Mixer , 2010, FMICS.
[2] Basel Alomair,et al. Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2010, IEEE Transactions on Parallel and Distributed Systems.
[3] Serge Vaudenay,et al. On Privacy Models for RFID , 2007, ASIACRYPT.
[4] Christof Paar,et al. RFID. Security and Privacy , 2011, Lecture Notes in Computer Science.
[5] Gildas Avoine,et al. Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols , 2010, RFIDSec.
[6] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[7] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[8] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[9] Paul Müller,et al. Providing Security and Privacy in RFID Systems Using Triggered Hash Chains , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[10] Gildas Avoine. Adversarial Model for Radio Frequency Identification , 2005, IACR Cryptol. ePrint Arch..
[11] Sebastian Mödersheim,et al. Secure Pseudonymous Channels , 2009, ESORICS.
[12] Srdjan Capkun,et al. Physical-layer identification of UHF RFID tags , 2010, MobiCom.
[13] Sebastian Mödersheim,et al. OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.