RFID ownership transfer protocol based on cloud
暂无分享,去创建一个
Qiang Zhao | Xiuqing Chen | Tianjie Cao | Jingxuan Zhai | Robin Doss | Lucas J. Wise | Tianjie Cao | R. Doss | Xiuqing Chen | Jingxuan Zhai | L. Wise | Qiang Zhao
[1] Chien-Hung Wu,et al. Improvement of the RFID authentication scheme based on quadratic residues , 2011, Comput. Commun..
[2] Wanlei Zhou,et al. Secure RFID Tag Ownership Transfer Based on Quadratic Residues , 2013, IEEE Transactions on Information Forensics and Security.
[3] Albert Levi,et al. A New Security and Privacy Framework for RFID in Cloud Computing , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[4] Wanlei Zhou,et al. A secure tag ownership transfer scheme in a closed loop RFID system , 2012, 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[5] Li Na Sun. Building Intelligent Parking Lot Based on RFID and Cloud Computing Technology , 2013 .
[6] Albert Levi,et al. An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer , 2013, LightSec.
[7] Daqiang Zhang,et al. An Efficient RFID Search Protocol Based On Clouds , 2015, Mobile Networks and Applications.
[8] Xin Wang,et al. Scalable and resynchronisable radio frequency identification ownership transfer protocol based on a sliding window mechanism , 2014, IET Inf. Secur..
[9] Gul N. Khan,et al. Low-cost authentication protocol for passive, computation capable RFID tags , 2015, Wirel. Networks.
[10] Serge Vaudenay,et al. On Privacy Models for RFID , 2007, ASIACRYPT.
[11] Elisa Bertino,et al. Cryptanalysis of Some RFID Authentication Protocols , 2008, J. Commun..
[12] Jack Douglas. PROBLEMS IN MEASURING PROBLEM-SOLVING IN DISCUSSION , 1953 .
[13] Chen Zhang,et al. TOA: a tag-owner-assisting RFID authentication protocol toward access control and ownership transfer , 2014, Secur. Commun. Networks.
[14] Hung-Min Sun,et al. Improvement of a novel mutual authentication scheme based on quadratic residues for RFID systems , 2008, 2009 Joint Conferences on Pervasive Computing (JCPC).
[15] Chen Zhang,et al. Cloud-based RFID authentication , 2013, 2013 IEEE International Conference on RFID (RFID).
[16] Cheng-Chi Lee,et al. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System , 2015, Journal of Medical Systems.
[17] Hung-Min Sun,et al. CRFID: An RFID system with a cloud database as a back-end server , 2014, Future Gener. Comput. Syst..
[18] Jue-Sam Chou,et al. A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems , 2009, IACR Cryptol. ePrint Arch..
[19] Mohammad Reza Aref,et al. Simulation-Based Traceability Analysis of RFID Authentication Protocols , 2014, Wirel. Pers. Commun..
[20] Fuchun Guo,et al. Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme , 2013, Wirel. Pers. Commun..
[21] R. C. Mittal,et al. A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System , 2014, Journal of Medical Systems.
[22] D. Boopathy,et al. Secured Cloud Data Storage––Prototype Trust Model for Public Cloud Storage , 2016 .
[23] Wanlei Zhou,et al. A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems , 2013, Ad Hoc Networks.
[24] Jiang Wu,et al. Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes , 2011, Wirel. Pers. Commun..
[25] Josep M. Miret,et al. A Secure Elliptic Curve-Based RFID Protocol , 2009, Journal of Computer Science and Technology.