A Group-based End-to-end Identity Authentication Method for Massive Power Wireless Private Network
暂无分享,去创建一个
Rui Liu | Weiwei Miao | Wei Li | Yang Li | Yong Dai | Mingxuan Zhang | Jin Fan
[1] Bala Srinivasan,et al. An Individual and Group Authentication Model for Wireless Network Services , 2010, J. Convergence Inf. Technol..
[2] Jui-Tang Wang,et al. Group-Based Authentication and Key Agreement , 2012, Wirel. Pers. Commun..
[3] C. Mitrpant,et al. An improved proof for RFID tags , 2008, 2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.
[4] Erl-Huei Lu,et al. Grouping Proof for RFID , 2011 .
[5] Sang-Soo Yeo,et al. Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[6] L. Bolotnyy,et al. Generalized "Yoking-Proofs" for a Group of RFID Tags , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.
[7] C. Mitrpant,et al. Performance comparison of the authentication protocols in RFID system , 2010, MEDES.
[8] Kouichi Sakurai,et al. Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).