A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs
暂无分享,去创建一个
[1] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[2] Sandra Dominikus,et al. Symmetric Authentication for RFID Systems in Practice , 2005 .
[3] Josep M. Miret,et al. A Secure Elliptic Curve-Based RFID Protocol , 2009, Journal of Computer Science and Technology.
[4] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[5] Sandra Dominikus,et al. An Application of RFID Tags using Secure Symmetric Authentication , 2005 .
[6] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[7] Damith C. Ranasinghe,et al. Networked RFID Systems and Lightweight Cryptography , 2008 .
[8] Kazuo Takaragi,et al. An Ultra Small Individual Recognition Security Chip , 2001, IEEE Micro.
[9] Tim Kerins,et al. An Elliptic Curve Processor Suitable For RFID-Tags , 2006, IACR Cryptol. ePrint Arch..
[10] Bryan Parno,et al. Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.
[11] Tanja Lange,et al. Computing Small Discrete Logarithms Faster , 2012, INDOCRYPT.
[12] Young-Sil Lee,et al. Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[13] István Vajda,et al. Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .
[14] Brian King,et al. Securing the Pharmaceutical Supply Chain using RFID , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[15] Mikko Lehtonen,et al. From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .
[16] Elgar Fleisch,et al. From Identification to Authentication; ; ; Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting , 2007 .
[17] Frédéric Thiesse,et al. Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.
[18] Avishai Wool,et al. Toward practical public key anti-counterfeiting for low-cost EPC tags , 2011, 2011 IEEE International Conference on RFID.
[19] Daniel W. Engels,et al. A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) , 2012, IACR Cryptol. ePrint Arch..
[20] Feng Cheng,et al. Exploring the impact of RFID on supply chain dynamics , 2004, Proceedings of the 2004 Winter Simulation Conference, 2004..
[21] Daniel W. Engels,et al. The Hummingbird-2 Lightweight Authenticated Encryption Algorithm , 2011, RFIDSec.
[22] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[23] C. Paar,et al. A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications , 2006 .