Hash-Based RFID Tag Mutual Authentication Scheme with Retrieval Efficiency
暂无分享,去创建一个
[1] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[2] Sang-Soo Yeo,et al. Scalable and Flexible Privacy Protection Scheme for RFID Systems , 2005, ESAS.
[3] Kwangjo Kim,et al. Mutual Authentication Protocol for Low-cost RFID , 2005, CRYPTO 2005.
[4] Juan E. Tapiador,et al. RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.
[5] Basel Alomair,et al. Privacy versus scalability in radio frequency identification systems , 2010, Comput. Commun..
[6] Aikaterini Mitrokotsa,et al. Classification of RFID Attacks , 2008, IWRT.
[7] Martin Feldhofer,et al. An ECDSA Processor for RFID Authentication , 2010, RFIDSec.
[8] Irfan Syamsuddin,et al. A Survey of RFID Authentication Protocols Based on Hash-Chain Method , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[9] Sang-Soo Yeo,et al. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..
[10] Marc Langheinrich,et al. A survey of RFID privacy approaches , 2009, Personal and Ubiquitous Computing.