1 |
M. Feldhofer and J. Wolkerstorfer, "Strong crypto for RFID tags - A comparison of low-power hardware implementations", IEEE International Symposium on Circuits and Systems, pp. 1839-1842, May 2007.
|
2 |
이상렬, "RFID 시스템의 개선된 인증 프로토콜", 컴퓨터정보학회논문지, 제 12권, 제 4호, 69-75쪽, 2007년. 12월.
과학기술학회마을
|
3 |
S.I. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, "S3PR: Secure Serverless Search Protocols for RFID", Information Security and Assurance (ISA), pp. 187-192, April 2008.
|
4 |
S.I. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, "Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol", International Jounal of Security and Its Applications (IJSIA), pp. 57-66, October 2008.
|
5 |
T.Y. Won, J.Y. Chun, and D.H. Lee, "Strong Authentication Protocol for Secure RFID Tag Search Without Help of Central Database", Embedded and Ubiquitous Computing, pp. 153-158, December 2008.
|
6 |
천지영, 황정연, 이동훈, "이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜", 정보보호학회논문지, 19(5), 59-69쪽, 2009. 10월
과학기술학회마을
|
7 |
C.C. Tan, B. Sheng, and Q.Li, "Secure and Serverless RFID Authentication and Search Protocols", IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1400-1407, April 2008.
DOI
ScienceOn
|
8 |
I.C. Lin, S.C. Tsaur, and K.P. Chang, "Lightweight and Serverless RFID Authentication and Search Protocol", International Conference on Computer and Electrical Engineering, pp. 95-99, December 2009.
|
9 |
C.C. Tan, B. Sheng, and Q. Li, "Serverless Search and Authentication Protocols for RFID", Pervasive Computing and Communications (PerCom) Workshops, pp. 3-12, March 2007.
|