Multi-tag and multi-owner RFID ownership transfer in supply chains
暂无分享,去创建一个
[1] Tassos Dimitriou. rfidDOT: RFID delegation and ownership transfer made simple , 2008, SecureComm.
[2] Selwyn Piramuthu,et al. Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols , 2009, 2009 First International Conference on Networks & Communications.
[3] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[4] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[5] Liu Jian-guo,et al. Mobile RFID security protocol and its GNY logic analysis , 2009 .
[6] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[7] Jin-Young Choi,et al. A Secure Communication Protocol for Low-Cost RFID System , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).
[8] 林詠章,et al. NONIDENTIFIABLE RFID PRIVACY PROTECTION WITH OWNERSHIP TRANSFER , 2010 .
[9] Ming-Hour Yang,et al. Lightweight authentication protocol for mobile RFID networks , 2010, Int. J. Secur. Networks.
[10] B. Song. RFID Tag Ownership Transfer , 2008 .
[11] Selwyn Piramuthu,et al. RFID mutual authentication protocols , 2011, Decis. Support Syst..
[12] Eun-Jun Yoon,et al. Two Security Problems of RFID Security Method with Ownership Transfer , 2008, 2008 IFIP International Conference on Network and Parallel Computing.
[13] Zeng Yan. Vendor-managed Inventory in Supply Chain , 2002 .
[14] Tony Yu-Ju Tu,et al. Identifying RFID-embedded objects in pervasive healthcare applications , 2009, Decis. Support Syst..
[15] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[16] Florian Michahelles,et al. The Dual Ownership Model A Concept for Efficient Access Management of Item-Level Data in Pharmaceutical Supply Chains , 2007 .
[17] Colin Boyd,et al. Examining Indistinguishability-Based Proof Models for Key Establishment Protocols , 2005, ASIACRYPT.
[18] Walid I. Khedr,et al. Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks , 2009, SECRYPT.
[19] Jianfeng Ma,et al. On the Security of the Canetti-Krawczyk Model , 2005, CIS.
[20] Gyözö Gódor,et al. Improved Lightweight Mutual Authentication Protocol for RFID Systems , 2008, MWCN/PWC.
[21] Selwyn Piramuthu,et al. Protocols for RFID tag/reader authentication , 2007, Decis. Support Syst..
[22] Wei-Bin Lee,et al. Enhancement of the RFID security method with ownership transfer , 2009, ICUIMC '09.
[23] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[24] Chris J. Mitchell,et al. Scalable RFID security protocols supporting tag ownership transfer , 2011, Comput. Commun..
[25] Pekka Jäppinen,et al. Enhanced RFID Security Method with Ownership Transfer , 2008, 2008 International Conference on Computational Intelligence and Security.
[26] Selwyn Piramuthu,et al. Single RFID Tag Ownership Transfer Protocols , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[27] Yeong-Lin Lai,et al. RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards , 2011, Int. J. Netw. Secur..
[28] Kouichi Sakurai,et al. Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).