Multilevel Secure RFID Based Object Tracking System
暂无分享,去创建一个
[1] S. Goswami,et al. Enhancement of GSM Security Using Elliptic Curve Cryptography Algorithm , 2012, 2012 Third International Conference on Intelligent Systems Modelling and Simulation.
[2] Martin Feldhofer,et al. A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.
[3] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[4] Hung-Yu Chien,et al. ECC-based lightweight authentication protocol with untraceability for low-cost RFID , 2009, J. Parallel Distributed Comput..
[5] Roberto Di Pietro,et al. An optimal probabilistic solution for information confinement, privacy, and security in RFID systems , 2011, J. Netw. Comput. Appl..
[6] Yong Guan,et al. Lightweight Secure Search Protocols for Low-cost RFID Systems , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[7] Kwangjo Kim,et al. Defending RFID authentication protocols against DoS attacks , 2011, Comput. Commun..
[8] Do-Hyeun Kim,et al. Animal Situation Tracking Service Using RFID, GPS, and Sensors , 2010, 2010 Second International Conference on Computer and Network Technology.
[9] Leonid Bolotnyy,et al. Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[10] Ingrid Verbauwhede,et al. Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.
[11] Wanlei Zhou,et al. A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems , 2013, Ad Hoc Networks.
[12] Wanlei Zhou,et al. Secure ownership transfer in multi-tag/multi-owner passive RFID systems , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[13] Hangrok Lee,et al. The Tag Authentication Scheme using Self-Shrinking Generator on RFID System , 2008 .
[14] Mark J. Clement,et al. Performance of finite field arithmetic in an elliptic curve cryptosystem , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[15] Sonali Nimbhorkar. Prospective Utilization of Elliptic Curve Cryptography for Security Enhancement , 2013 .
[16] Julio César Hernández Castro,et al. Flaws on RFID grouping-proofs. Guidelines for future sound protocols , 2011, J. Netw. Comput. Appl..
[17] Turki F. Al-Somani,et al. Comparative Study of Elliptic Curve Cryptography Hardware Implementations in Wireless Sensor Networks , 2013 .
[18] Saad Islam,et al. Developing and implementing encryption algorithm for addressing GSM security issues , 2009, 2009 International Conference on Emerging Technologies.
[19] Kinjal Mehta,et al. A Survey on Elliptic Curve Cryptography , 2015 .
[20] Tim Kerins,et al. An Elliptic Curve Processor Suitable For RFID-Tags , 2006, IACR Cryptol. ePrint Arch..
[21] Ankush Vishwanath,et al. RFID and GSM Based Three Level Security System , 2013, 2013 Texas Instruments India Educators' Conference.
[22] Yu-Jung Huang,et al. Hardware Implementation of RFID Mutual Authentication Protocol , 2010, IEEE Transactions on Industrial Electronics.
[23] Mesud Hadzialic,et al. An approach to analyze security of GSM network , 2014, 2014 22nd Telecommunications Forum Telfor (TELFOR).
[24] Wanlei Zhou,et al. Secure Tag Search in RFID Systems Using Mobile Readers , 2015, IEEE Transactions on Dependable and Secure Computing.
[25] Erich Wenger,et al. Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations , 2011, NordSec.