Efficient P2P-based mutual authentication protocol for RFID system security of EPC network using asymmetric encryption algorithm
暂无分享,去创建一个
[1] Seif Haridi,et al. An Overview of Structured P2P Overlay Networks , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.
[2] Julio César Hernández Castro,et al. A secure distance-based RFID identification protocol with an off-line back-end database , 2012, Personal and Ubiquitous Computing.
[3] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[4] Ahmad-Reza Sadeghi,et al. Trusted Computing - Special Aspects and Challenges , 2008, SOFSEM.
[5] Aruna Seneviratne,et al. PROST: a programmable structured peer-to-peer overlay network , 2004 .
[6] Ruchuan Wang,et al. A Novel RFID Reader System Framework based on Peer-to-Peer Network , 2011 .
[7] Ruchuan Wang,et al. P2PONS: A Distributed Object Naming Service Architecture based on P2P for EPC Network , 2011 .
[8] Dong Wang,et al. Use of RFID for Intelligent Pre-shipment Inspection , 2010, J. Digit. Content Technol. its Appl..
[9] Ingmar Baumgart,et al. S/Kademlia: A practicable approach towards secure key-based routing , 2007, 2007 International Conference on Parallel and Distributed Systems.
[10] Mike Burmester,et al. Universally composable and forward-secure RFID authentication and authenticated key exchange , 2007, ASIACCS '07.
[11] Ran Canetti,et al. Obtaining Universally Compoable Security: Towards the Bare Bones of Trust , 2007, ASIACRYPT.
[12] Yuanbo Guo,et al. Security Improvement in Authentication Protocol for Gen-2 Based RFID System , 2011 .
[13] Hung-Min Sun,et al. Improvement of a novel mutual authentication scheme based on quadratic residues for RFID systems , 2008, 2009 Joint Conferences on Pervasive Computing (JCPC).
[14] Dong Wang,et al. Impact of RFID Technology on Tracking of Export Goods in Kenya , 2010, J. Convergence Inf. Technol..
[15] Jian Wang,et al. New Learning Algorithms for Third-Order 2-D Hidden Markov Models , 2011 .
[16] Kwangjo Kim,et al. Defending RFID authentication protocols against DoS attacks , 2011, Comput. Commun..
[17] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[18] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[19] Jon Crowcroft,et al. A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.