Analysis and Design of Group RFID Tag Security Authentication Protocol
暂无分享,去创建一个
[1] Behnam Bahrak,et al. Security analysis of an RFID tag search protocol , 2016, Inf. Process. Lett..
[2] Masoud Hadian Dehkordi,et al. Improvement of the Hash-Based RFID Mutual Authentication Protocol , 2014, Wirel. Pers. Commun..
[3] Jie Wu,et al. Fast Identification of Blocked RFID Tags , 2018, IEEE Transactions on Mobile Computing.
[4] Mohammad Reza Aref,et al. Traceability Analysis of Recent RFID Authentication Protocols , 2015, Wirel. Pers. Commun..
[5] Mohammad Mardani Shahrbabak,et al. SRMAP and ISLAP Authentication Protocols: Attacks and Improvements , 2016, IACR Cryptol. ePrint Arch..
[6] M. Ufuk Çaglayan,et al. Providing destructive privacy and scalability in RFID systems using PUFs , 2015, Ad Hoc Networks.
[7] Yuguang Fang,et al. Lightweight Anonymous Authentication Protocols for RFID Systems , 2017, IEEE/ACM Transactions on Networking.
[8] Wanlei Zhou,et al. Secure Tag Search in RFID Systems Using Mobile Readers , 2015, IEEE Transactions on Dependable and Secure Computing.
[9] Chen Liang,et al. Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G , 2016, Secur. Commun. Networks.
[10] Maede Ashouri-Talouki,et al. DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT , 2017, The Journal of Supercomputing.
[11] Rasoul Ramezanian,et al. An Improvement over a Server-less RFID Authentication Protocol , 2014 .
[12] Muhammad Khurram Khan,et al. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments , 2016, Journal of Medical Systems.
[13] Yang Xiang,et al. A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment , 2017, Multimedia Tools and Applications.