Research on Hash-Based Low-Cost RFID Security Authentication Protocol
暂无分享,去创建一个
[1] Hongnian Yu,et al. An efficient and secure authentication protocol for RFID systems , 2011, The 17th International Conference on Automation and Computing.
[2] Daoxu Chen,et al. RFID Data Management: Algorithms, Protocols and Performance Evaluation: RFID Data Management: Algorithms, Protocols and Performance Evaluation , 2014 .
[3] Mohamed A. Sharaf. RFID Mutual Authentication and Secret Update Protocol for Low-Cost Tags , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[4] Dongho Won,et al. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.
[5] Gwoboa Horng,et al. An efficient and secure RFID protocol with ownership transfer , 2011, 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT).
[6] Li Jintao,et al. Research on Hash-Based RFID Security Authentication Protocol , 2009 .
[7] Kaan Yuksel,et al. Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications , 2004 .
[8] Jiming Chen,et al. RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations , 2009 .
[9] Yin Ya. RFID Data Management: Algorithms,Protocols and Performance Evaluation , 2013 .