1 |
S. Dominikus and J.-M. Schmidt, "Connecting passive RFID tags to the internet of things," in Proc. Interconnecting Smart Objects with the Internet Workshop, Prague, 2011.
|
2 |
W. S. Choi, S. S. Kim, Y. H. Kim, T. J. Yoon, K. W. Ahn, and K. J. Han, "Design of PUF-based encryption processor and mutual authentication protocol for low-cost RFID authentication," J. KICS, vol. 39, no. 12, pp. 831-841, Dec. 2014.
|
3 |
J. S. Kim, J. K. Park, and Y. T. Shin, "RFID-based automatic inspection system design and implementation for manufacturing and retail industry," J. KICS, vol. 39, no. 1, pp. 97-105, Jan. 2014.
|
4 |
S. J. Oh, C. H. Lee, T. J. Yoon, K. H. Chung, and K. S. Ahn, "Improved authentication protocol for privacy protection in RFID systems," J. KICS, vol. 38, no. 1, pp. 12-18, Jan. 2013.
|
5 |
D. Molnar, A. Soppera, and D. Wagner, "A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags," in Workshop on RFID Security and Light-Weight Crypto., Jul. 2005.
|
6 |
J. Saito, K. Imamoto, and K. Sakurai, "Reassignment scheme of an RFID tag's key for owner transfer," in Proc. EUC Workshops, vol. 3823 LNCS, pp. 1303-1312, 2005.
|
7 |
G. Kapoor and S. Piramuthu, "Single RFID tag ownership transfer protocols," IEEE Trans. Systems, Man, and Cybernetics, Part C, vol. 42, no. 2, pp. 164-173, 2012.
DOI
|
8 |
G. Kapoor, W. Zhou, and S. Piramuthu, "Multi-tag and multi-owner RFID ownership transfer in supply chains," Decision Support Syst., vol. 52, no. 1, pp. 258-270, 2011.
DOI
ScienceOn
|
9 |
H. Lei and T. Cao, "RFID protocol enabling ownership transfer to protect against traceability and dos attacks," in Proc. 1st Int. Symp. Data, Privcacy E-Commerce, pp. 508-510, 2007.
|
10 |
G. Kapoor and S. Piramuthu, "Single RFID tag ownership transfer protocols," IEEE Trans. Syst., Man, and Cybernetics, Part C, vol. 42, no. 2, pp. 164-173, 2012.
DOI
|
11 |
G. Kapoor, W. Zhou, and S. Piramuthu, "Multi-tag and multi-owner RFID ownership transfer in supply chains," Decision Support Syst., vol. 52, no. 1, pp. 258-270, 2011.
DOI
ScienceOn
|
12 |
G. Kapoor and S. Piramuthu, "Vulnerabilities ini some recently proposed RFID ownership transfer protocols," in Proc. NetCoM'09, pp. 354-357, 2009.
|