A New Scalable Lightweight Grouping Proof Protocol for RFID systems
暂无分享,去创建一个
Wei Zhang | Shengming Wang | Longkai Wu | Baolin Yi | Shiming Qin | Wei Zhang | Longkai Wu | Baolin Yi | Shengming Wang | Shiming Qin
[1] Hazem Tawfik,et al. Generalized Cochannel Outage Analysis with DTX in PCS Channels , 1998, Wirel. Pers. Commun..
[2] 黄平,et al. A New Lightweight RFID Grouping Proof Protocol , 2013 .
[3] Yi Mu,et al. An efficient and provably secure RFID grouping proof protocol , 2017, ACSW.
[4] Ben Niu,et al. Security Analysis of a Privacy-preserving ECC-based Grouping-proof Protocol , 2011 .
[5] Hung-Yu Chien,et al. Two RFID-based Solutions to Enhance Inpatient Medication Safety , 2011, Journal of Medical Systems.
[6] Wei Zhang,et al. A Collaboratively Hidden Location Privacy Scheme for VANETs , 2014, Int. J. Distributed Sens. Networks.
[7] Jung-Hui Chiu,et al. Solving Scalability Problems on Secure RFID Grouping-Proof Protocol , 2015, Wirel. Pers. Commun..
[8] Nasour Bagheri,et al. An authenticated encryption based grouping proof protocol for RFID systems , 2016, Secur. Commun. Networks.
[9] Nasour Bagheri,et al. A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications , 2017, The Journal of Supercomputing.
[10] Tao Huang,et al. A Trajectory Privacy Model for Radio-Frequency Identification System , 2016, Wirel. Pers. Commun..
[11] Hsiao-Hwa Chen,et al. Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[12] Juan E. Tapiador,et al. LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification , 2009, Comput. Stand. Interfaces.
[13] Wei Zhang,et al. An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection , 2017, Wirel. Pers. Commun..
[14] Wanlei Zhou,et al. Offline grouping proof protocol for RFID systems , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[15] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[16] Ray Yeuh-Min Huang,et al. Advanced Technologies, Embedded and Multimedia for Human-centric Computing - HumanCom and EMC 2013 [International Conference on Human-centric Computing, HumanCom 2013 / 8th International Conference on Embedded and Multimedia Computing, EMC 2013, Taipei, Taiwan, August 23-25, 2013] , 2014, EMC/HumanCom.
[17] Lin Wu,et al. A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks , 2013, Int. J. Distributed Sens. Networks.
[18] Nadeem Javaid,et al. iAMCTD: Improved Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR Protocol for Underwater Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[19] Nai-Wei Lo,et al. Anonymous Coexistence Proofs for RFID Tags , 2010, J. Inf. Sci. Eng..
[20] Kefei Chen,et al. A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety , 2012, Journal of Medical Systems.
[21] Yuewu Wang,et al. Offline RFID Grouping Proofs with Trusted Timestamps , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[22] Laurence T. Yang,et al. Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.
[23] Ma Chang,et al. Low Cost RFID Authentication Protocol with Forward Privacy , 2011 .
[24] Julio César Hernández Castro,et al. Flaws on RFID grouping-proofs. Guidelines for future sound protocols , 2011, J. Netw. Comput. Appl..
[25] Wei Zhang,et al. An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree , 2013, Int. J. Distributed Sens. Networks.