ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience
暂无分享,去创建一个
[1] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[2] Bo Sheng,et al. Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.
[3] Lei Hu,et al. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[4] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[5] Gregory J. Walters,et al. Privacy and security: an ethical analysis , 2001, CSOC.
[6] Mike Burmester,et al. Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols , 2006, 2006 Securecomm and Workshops.
[7] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[8] Lei Hu,et al. Privacy-preserving authentication with low computational overhead for RFID systems , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[9] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[10] Vassilis Kostakos,et al. rfid in pervasive computing: State-of-the-art and outlook , 2009, Pervasive Mob. Comput..
[11] Damith C. Ranasinghe,et al. Networked RFID Systems and Lightweight Cryptography , 2008 .
[12] Andrei V. Kelarev,et al. The Theory of Information and Coding , 2005 .
[13] Tharam S. Dillon,et al. Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database , 2007, MSN.
[14] Song Han,et al. Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor , 2007, ICCSA.
[15] Dong Hoon Lee,et al. Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.
[16] Andrew S. Tanenbaum,et al. The evolution of RFID security , 2006, IEEE Pervasive Computing.
[17] Bo Sheng,et al. Severless Search and Authentication Protocols for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[18] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[19] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.