1 |
Yang, Ming-Hour, Luo, Jia, Lu, Shao, "A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme," Sensors, Vol.15, No.10, MDPI, 2015.
|
2 |
Z. Shi, X. Zhang, and J. Liu, "The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security," Wireless Communications and Mobile Computing, Article ID 8436917, 2020.
|
3 |
Hong Liu, Huansheng Ning, Yinliang Yue, Yueliang Wan, and Laurence T. Yang, "Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices," Future Generation Computer Systems, Vol.78, Part.3, pp.976-986, 2018.
DOI
|
4 |
Wei Zhang, Shiming Qin, Shengming Wang, Longkai Wu, and Baolin Yi, "A New Scalable Lightweight Grouping Proof Protocol for RFID systems," Wireless Personal Communications, Vol.103, pp.133-143, 2018.
DOI
|
5 |
Z. Zhou, P. Liu, Q. Liu, and G. Wang, "An Anonymous Offline RFID Grouping-Proof Protocol," Future Internet, Vol.10, No.1, p.2, 2018.
DOI
|
6 |
K. Finkenzeller, "RFID Handbook, Fundamentals and Applications in Contactless Smart Cards and Identification," John Wiley and Sons Ltd,, pp.226-232, 2003.
|
7 |
S. Piramuthu, "On existence proofs for multiple RFID tags," Proceeding of ACS/IEEE International Conference on Pervasive Services, pp.317-320, 2005.
|
8 |
"EPCglobal class1 gen2 RFID specifications," Whitepaper, 2008
|
9 |
A. Juels, "Yoking proofs for RFID tags," Proceedings of the 2nd IEEE Annual Conference on Computing and Communication Workshops, pp.138-143, 2008.
|
10 |
J. Saito and K. Sakurai, "Grouping proof for RFID tags," Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Vol.2, pp.621-624, 2005.
|
11 |
L. Bolotnyy and G. Robins, "Generalized yoking proofs for a group of RFID tags," Proceeding of the 3rd International Conference on Mobile and Ubiquitous Systems Workshops, pp.1-4, 2006.
|
12 |
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags," Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp.55-60, 2007.
|
13 |
P. Peris-Lopez, A. Orfila, J. C. Hernandez-Castro, Vander Lubbe, and C. A. Jan, "Flaws on RFID Grouping-Proofs," Guidelines for Future Sound, J. Netw. Comput. Appl, Vol.4, No.3, pp.833-845, 2011.
|
14 |
J. S. Cho, S. S. Yeo, S. C. Hwang, S. Y. Rhee, and S. K. Kim, "Enhanced yoking proof protocols for RFID tags and tag groups," Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops, WAINA'08, pp.1591-1596, 2008.
|
15 |
Y. Lien, X. Leng, K. Mayes, and J. Chiu, "Reading order independent grouping proof for RFID tags," Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp.128-136, IEEE, 2008.
|
16 |
M. Burmester, B. Medeiros, and R. Motta, "PrOFF-Vably secure grouping proofs for RFID tags," Proceedings of the 8th IFIP international conference on Smart Card Research and Advanced Applications, pp.176-190, Springer Verlag, Berlin, Heidelberg, 2008.
|