MAP: Towards Authentication for Multiple Tags
暂无分享,去创建一个
Jianfeng Ma | Shan Chang | Qingsong Yao | Jinsong Han | Zhuo Liu | Saiyu Qi
[1] Serge Vaudenay,et al. On Privacy Models for RFID , 2007, ASIACRYPT.
[2] Gene Tsudik. A Family of Dunces: Trivial RFID Identification and Authentication Protocols , 2007, Privacy Enhancing Technologies.
[3] Shai Halevi,et al. Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population , 2009, ArXiv.
[4] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[5] Wenjing Lou,et al. A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[6] Lei Yang,et al. Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.
[7] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[8] Paul Müller,et al. Providing Security and Privacy in RFID Systems Using Triggered Hash Chains , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[9] Shaojie Tang,et al. A Delay-Efficient Algorithm for Data Aggregation in Multihop Wireless Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.
[10] Ari Juels,et al. Defining Strong Privacy for RFID , 2007, PerCom Workshops.
[11] Lei Yang,et al. Privacy Leakage in Access Mode: Revisiting Private RFID Authentication Protocols , 2011, 2011 International Conference on Parallel Processing.
[12] Himanshu Gupta,et al. Slotted Scheduled Tag Access in Multi-Reader RFID Systems , 2007, 2007 IEEE International Conference on Network Protocols.
[13] Yunhao Liu,et al. Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..
[14] Tassos Dimitriou,et al. A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[15] Giuseppe Bianchi,et al. Revisiting an RFID Identification-Free Batch Authentication Approach , 2011, IEEE Communications Letters.
[16] Adi Shamir. SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags , 2008, FSE.
[17] Robert H. Deng,et al. RFID privacy: relation between two notions, minimal condition, and efficient construction , 2009, CCS.
[18] Wonjun Lee,et al. Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.
[19] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[20] Yuanqing Zheng,et al. Fast tag searching protocol for large-scale RFID systems , 2011, ICNP 2011.
[21] Yunhao Liu,et al. Refresh: Weak Privacy Model for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[22] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[23] Joarder Kamruzzaman,et al. Security and Privacy in RFID Systems , 2013 .
[24] Bo Sheng,et al. Group authentication in heterogeneous RFID networks , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[25] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[26] Vassilis Kostakos,et al. rfid in pervasive computing: State-of-the-art and outlook , 2009, Pervasive Mob. Comput..
[27] Philippe Oechslin,et al. Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.
[28] Yunhao Liu,et al. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.
[29] Yunhao Liu,et al. Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[30] Yunhao Liu,et al. Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays , 2012, IEEE Transactions on Parallel and Distributed Systems.
[31] Mike Burmester,et al. Robust, anonymous RFID authentication with constant key-lookup , 2008, ASIACCS '08.