Securing RFID systems conforming to EPC Class 1 Generation 2 standard
暂无分享,去创建一个
Yanjun Wang | Sheng-Shih Wang | Tzu-Chang Yeh | Tsai-Chi Kuo | T. Kuo | Sheng-Shih Wang | Tzu-Chang Yeh | Yanjun Wang
[1] Jung Lyu,et al. Integrating RFID with quality assurance system - Framework and applications , 2009, Expert Syst. Appl..
[2] Yang Xiao,et al. Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..
[3] Tsuyoshi Takagi,et al. An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.
[4] Juan E. Tapiador,et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard , 2009, Comput. Stand. Interfaces.
[5] Chris J. Mitchell,et al. RFID authentication protocol for low-cost tags , 2008, WiSec '08.
[6] Mikhail Nesterenko,et al. RFID security without extensive cryptography , 2005, SASN '05.
[7] Daesung Kwon,et al. Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards , 2009, Comput. Stand. Interfaces.
[8] Kwangjo Kim,et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .
[9] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[10] Bruce Schneier,et al. Ten Risks of PKI , 2004 .
[11] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[12] Soo-Young Kang,et al. A study on secure RFID mutual authentication scheme in pervasive computing environment , 2008, Comput. Commun..
[13] Nai-Wei Lo,et al. An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System , 2007, EUC Workshops.
[14] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.