A Novel Bidirectional RFID Identity Authentication Protocol
暂无分享,去创建一个
Mingdong Tang | Kuan-Ching Li | Tien-Hsiung Weng | Jianbo Xu | Wei Liang | Songyou Xie | Tien-Hsiung Weng | Kuan-Ching Li | Mingdong Tang | Jianbo Xu | W. Liang | Songyou Xie
[1] Srinivas Devadas,et al. PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.
[2] Srinivas Devadas,et al. Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[3] Charalampos Manifavas,et al. Lightweight Cryptography for Embedded Systems - A Comparative Analysis , 2013, DPM/SETOP.
[4] Sherali Zeadally,et al. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.
[5] Jonathan Katz. Analysis of a Proposed Hash-Based Signature Standard , 2016, SSR.
[6] Georg T. Becker,et al. The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs , 2015, CHES.
[7] Wang Cha. Heuristic Attack Strategy Against Improved LMAP+ Protocol , 2014 .
[8] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[9] Gildas Avoine,et al. Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography , 2013, IEEE Transactions on Mobile Computing.
[10] Woei-Jiunn Tsaur,et al. PUF-Based Protocols About Mutual Authentication and Ownership Transfer for RFID Gen2 v2 Systems , 2016, IMECS 2016.
[11] Ch. Venkateswarlu,et al. SAFER CARDS ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING , 2014 .
[12] Debdeep Mukhopadhyay,et al. PUFs as Promising Tools for Security in Internet of Things , 2016, IEEE Des. Test.
[13] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[14] Jeroen Delvaux. Security Analysis of PUF-based Key Generation and Entity Authentication ; Veiligheidsanalyse van PUF-gebaseerde sleutelgeneratie en entiteitsauthenticatie , 2017 .
[15] Srinivas Devadas,et al. Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching , 2014, IEEE Transactions on Emerging Topics in Computing.
[16] Wim Dehaene,et al. On the effect of technology scaling on variation-resilient sub-threshold circuits , 2015 .
[17] Emil Nilsson,et al. Ultra Low Power Wake-Up Radio Using Envelope Detector and Transmission Line Voltage Transformer , 2013, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.
[18] Avishai Wool,et al. Implementing public-key cryptography on passive RFID tags is practical , 2015, International Journal of Information Security.
[19] Derek Abbott,et al. Emerging Physical Unclonable Functions With Nanotechnology , 2016, IEEE Access.
[20] Leonid Bolotnyy,et al. Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[21] Maurizio Pizzonia,et al. Efficient and practical authentication of PUF-based RFID tags in supply chains , 2010, 2010 IEEE International Conference on RFID-Technology and Applications.