Efficient authentication scheme with tag-identity protection for EPC Class 2 Generation 2 version 2 standards
暂无分享,去创建一个
[1] Kwangjo Kim,et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .
[2] Joaquín García,et al. Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags , 2010, Financial Cryptography Workshops.
[3] Kwangjo Kim,et al. Mutual Authentication Protocol for Low-cost RFID , 2005, CRYPTO 2005.
[4] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[5] Jaemin Park,et al. A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 Tag , 2007, Future Generation Communication and Networking (FGCN 2007).
[6] J. Mitsugi,et al. A Tamper Detection Method for RFID Tag Data , 2008, 2008 IEEE International Conference on RFID.
[7] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[8] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[9] Ming-Hour Yang,et al. Secure multiple group ownership transfer protocol for mobile RFID , 2012, Electron. Commer. Res. Appl..
[10] Dong Hoon Lee,et al. Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems , 2009, Comput. Stand. Interfaces.
[11] Chris J. Mitchell,et al. RFID authentication protocol for low-cost tags , 2008, WiSec '08.
[12] Wei-Bin Lee,et al. Enhancement of the RFID security method with ownership transfer , 2009, ICUIMC '09.
[13] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[14] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[15] Hung-Yu Chien,et al. Gen2v2-Security-and-Privacy-Features-Leveraged Application Designs , 2014, 2014 Ninth Asia Joint Conference on Information Security.
[16] Dong Hoon Lee,et al. Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems , 2006, OTM Workshops.
[17] Zhong Chen,et al. Lightweight RFID Mutual Authentication Protocol against Feasible Problems , 2011, ICICS.
[18] Panu Hämäläinen,et al. Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).
[19] Hung Yu Chien. New Gen2v2-Based Mutual Authentication Schemes , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.
[20] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[21] Junyu Wang,et al. On security with the new Gen2 RFID security framework , 2013, 2013 IEEE International Conference on RFID (RFID).
[22] Basel Alomair,et al. Securing low-cost RFID systems: An unconditionally secure approach , 2011, J. Comput. Secur..
[23] Manfred Josef Aigner,et al. Report on first part of the security WP: Anti-Cloning Tag (D4.3.1) , 2008 .
[24] Hung-Yu Chien,et al. On the security of several Gen2-based protocols without modifying the standards , 2012 .
[25] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[26] Hung-Yu Chien,et al. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.
[27] Philippe Oechslin,et al. Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.
[28] Kwangjo Kim,et al. RFID mutual Authentication Scheme based on Synchronized Secret Information , 2006 .