An RFID Authentication Protocol based Symmetric Key using Hashed Tag ID
暂无分享,去创建一个
[1] Chang-Hoon Kim,et al. VLSI Architecture for High Speed Implementation of Elliptic Curve Cryptographic Systems , 2008 .
[2] Sandra Dominikus,et al. Symmetric Authentication for RFID Systems in Practice , 2005 .
[3] Pedro Peris-López,et al. LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags , 2006 .
[4] Juan E. Tapiador,et al. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.
[5] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[6] Chae Hoon Lim,et al. mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors , 2005, WISA.
[7] 이동훈,et al. 저가형 RFID 시스템을 위한 효율적인 인증 프로토콜 , 2005 .
[8] KyungOh Lee,et al. An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems , 2006 .
[9] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[10] Leonid Bolotnyy,et al. Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[11] Tsuyoshi Takagi,et al. An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.
[12] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[13] Dongho Won,et al. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.
[14] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[15] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[16] Jongsung Kim,et al. HIGHT: A New Block Cipher Suitable for Low-Resource Device , 2006, CHES.
[17] Kwangjo Kim,et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .
[18] Martin Feldhofer,et al. A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.
[19] Soo-Young Kang,et al. A study on secure RFID mutual authentication scheme in pervasive computing environment , 2008, Comput. Commun..
[20] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[21] Sungbae Ji. RFID-enabled Extensible Authentication Framework and Its Applications , 2008 .
[22] Yong Guan,et al. Lightweight Secure Search Protocols for Low-cost RFID Systems , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[23] Lars Skaar Kulseng. Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems , 2009 .