RFID Specification Revisited
暂无分享,去创建一个
Julio C. Hernandez-Castro | Arturo Ribagorda | Juan M. Estevez-Tapiador | Pedro Peris-Lopez | Pedro Peris-López | A. Ribagorda | J. M. Estévez-Tapiador | Julio Hernandez-Castro
[1] Juan E. Tapiador,et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard , 2009, Comput. Stand. Interfaces.
[2] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..
[3] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[4] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[5] Martin Feldhofer,et al. A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.
[6] Juan E. Tapiador,et al. RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.
[7] Ari Juels,et al. Shoehorning Security into the EPC Tag Standard , 2006, SCN.
[8] Juan E. Tapiador,et al. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.
[9] Alexander Maximov,et al. Cryptanalysis of Grain , 2006, FSE.
[10] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[11] Michael Goshey,et al. Radio frequency identification (RFID) , 2006, Comput. Secur..
[12] Dong Hoon Lee,et al. Efficient RFID Authentication Protocol for Ubiquitous Computing Environment , 2005, EUC Workshops.
[13] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[14] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[15] Kwangjo Kim,et al. Mutual Authentication Protocol for Low-cost RFID , 2005, CRYPTO 2005.
[16] Dongho Won,et al. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.
[17] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[18] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[19] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[20] Niels Provos,et al. ScanSSH: Scanning the Internet for SSH Servers , 2001, LISA.
[21] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[22] Mark Weiser,et al. The computer for the 21st Century , 1991, IEEE Pervasive Computing.
[23] Kwangjo Kim,et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .
[24] Kwangjo Kim,et al. RFID mutual Authentication Scheme based on Synchronized Secret Information , 2006 .
[25] Andrew S. Tanenbaum,et al. The evolution of RFID security , 2006, IEEE Pervasive Computing.
[26] Damith C. Ranasinghe,et al. Low-Cost RFID Systems: Confronting Security and Privacy , 2005 .
[27] István Vajda,et al. Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .
[28] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.