1 |
M. F. Mubarak, J. A. Manan, S. Yahya, "A Critical Review on RFID System towards Security, Trust, and Privacy (STP)," 2011 IEEE 7th International Colloquium on Signal Processing and its Applications, pp. 39-44, March. 2011.
|
2 |
Gilbert S. Vernam, "U.S.Patent 1,310,719. Secret signaling system," July. 1919.
|
3 |
C. Shannon, "Communication Theory of Secrecy Systems," Bell System Technical Journal, Vol. 28, pp. 656-715, October. 1949.
DOI
|
4 |
Jiao-Hongqiang, Tian-Junfeng, Wang-Baomin, "A Study on the One-Time Pad Scheme Based Stern-Brocot Tree," ISCSCT 2008, pp. 568-571, December. 2008.
|
5 |
M. Jung, Horst Fiedler, and Renee Lerch, "8-Bit Micr ocontroller System with Area Efficient AES Coprocessor for Transponder Application," Workshop on RFID and Lightweight Crypto, pp. 32-43, July. 2005.
|
6 |
J. Ha, J. Park, J. Ha, H. Kim, S. Moon, "Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System," Journal of KIISC, Vol. 18, No. 1, pp. 77-87, February. 2008.
|
7 |
B. Toiruul, K. Lee, "An Advanced Mutual-Authentic ation Algorithm Using AES for RFID Systems," IJCSNS, September. 2006.
|
8 |
J. Daemen, V. Rijmen, "The Design of Rijndael," AES-The Advanced Encryption Standard, Spring er-Verlog, Berlin, Heidelberg, New York, March. 2002.
|
9 |
J. Daemen, V. Rijmen, "AES Proposal; Rijndael, Version2," Submission to NIST, March. 1999.
|
10 |
M. Aigner and M. Feldhofer, "Secure Symmetric Authentication for RFID Tags," Telecommunication and mobile computing - TCMC 2005, March. 2005.
|
11 |
M. F. Mubarak, J. A. Manan, S. Yahya, "Mutual Attestation Using TPM for Trusted RFID Protocol," In 2nd International Conference on Network Applications, Protocols and Services-NETAPPS 2010, Kedah, Malaysia, September. 2010.
|
12 |
M. Feldhofer, S. Dominikus, Rijmen, J. Wolkerstor fer, "Strong Authentication for RFID Systems Using The AES Algorithm," ICCHES, pp. 357-370, August. 2004.
|
13 |
S. Oh, K. Chung, C. Jung, K. Ahn, "An RFID Mutual Authentication Protocol using One-time Random Number," Journal of Security Engineering, Vol. 7, No. 3, June. 2010.
|
14 |
K. Finkenzeller, "RFID Hand Book: Fundamentals and Applications in Contactless Smart Card and Identification, Second Edition," John Wiley & Sons Ltd., July. 2003.
|
15 |
P. H. Cole, "Fundamentals in RFID part1, Korean RFID course," 2006, http://autoidlab.eleceng.adelaide.edu.au/ education/FundamentalsInRfidPart1.pdf.
|
16 |
B. Koo, G. Ryu, S. Yang, T. Chang, S. Lee, "Low-cost AES Implementation for RFID tags," Journal of KIISC, Vol. 16, No. 5, pp. 67-77, October. 2006.
|