1 |
Raphael C.-W. Phan, "Cryptanalysis of a New Ultra-lightweight RFID Authentication Protocol-SASI", IEEE Transaction on Dependable and Secure Computing, V.6, N.4, pp.316-320, Oct 2009
DOI
ScienceOn
|
2 |
George Poulopoulos, Konstantinos Markantonakis, Keith Mayes, "A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems", pp.706-p.711, 2009 International Conference on Availability, Reliability and Security
|
3 |
Dong-liang Wu, "A brief Survey on Current RFID Application", Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, 12-15 July 2009, pp.2330-2335
|
4 |
S.A.Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", In Security in Pervasive Comp., volume 2802 of LNCS, pages 201-212, 2004.A
|
5 |
M. Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.31, n.56, pp.357-370, 2004
|
6 |
Karygiannis, "Karygianni's Taxonomy Model in RFID Threats", 2008 11th IEEE International Conference on Communication Technology Proceedings, pp.765-768
|
7 |
Faouzi Kamoun, "RFID System Management: State-of-the Art and Open Research Issues", IEEE Trans. on Network and Service Management, V. 6, N. 3, pp.190-205, Sep. 2009.
DOI
ScienceOn
|
8 |
J.D.H, etcs, "Strong Authentication and improving privacy with ultra-weight RFID authentication Protocol", KIISC, v.19, n.19, pp.81-91, 2009
|
9 |
P. Peris-Lopez, etcs, "M2AP: A Minimalist mutual authentication Protocol for Low-cost RFID Tags", Proc. Int' Conf Ubiquitous Intelligence and Computing, pp.912-923, 2006.
|
10 |
H.Y. Chien. "SASI: A New Ultra-weight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing., vol.4, n.4, pp.337-340, Oct. 2007
DOI
ScienceOn
|
11 |
P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, and A. Rib-agorda, "RFID systems: A survey on security threats and proposed solutions," in 11th IFIP International Conference on Personal Wireless Communications - PWC06, ser. Lecture Notes in Computer Science, vol.4217. Springer-Verlag, September 2006, pp. 159-170.
|
12 |
Ari Juels, "RFID Security and Privacy: A Research Survey", IEEE Journal of selected areas in communications, V.24, N.2, pp.381-394, February, 2006
DOI
ScienceOn
|
13 |
P. Peris-Lopez, etcs, "LMAP: A Real Lightweight Low-cost RFID Tags", Proc. Second Workshop RFID Security, July, 2006
|
14 |
P. Ekdahl, and T. Johansson, "Another attack on A5/1", IEEE Transactions on Information Theory, V.49, N.1, pp.284-289, 2003A
DOI
ScienceOn
|
15 |
Martin Feldhofer, "Strong crypto for RFID Tag, - A comparison of low power hardware implementation", 2007 IEEE, pp.1839-1842
|
16 |
Yanjun Zuo, "Survivable RFID Systems: Issues, Challenges, and Techniques", IEEE Transaction on Systems Man and Cybernetics,-Part C: Applications and reviews, v. 40, n. 4, pp. 406-418, July 2010
|
17 |
P. Peris-Lopez, etcs, "EMAP: An Efficient Mutal Authentication Protocol for Low-Cost RFIDs", Proc. OTM Federated Conf and Workshop: IS Workshop, Nov. 2006
|
18 |
Selwyn Piramuthu, "Lightweight Cryptographic Authentication in Passive RFID Tagged Systems," IEEE Tran. On Systems, Man, and Cybernetics-Part C: Applications and review, v.38, n.3, pp.360-376, May 2008
DOI
ScienceOn
|
19 |
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 352-361. Springer, Heidelberg, 2006
|
20 |
Andrey B,etcs, "Hash functions and RFID tags: Mind the Gap:, CHES 2008, LNCS, pp.283-299, 2008
|