1 |
George Poulopoulos, Konstantinos Markantonakis, Keith Mayes, "A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems", pp.706-p.711, 2009 International Conference on Availability, Reliability and Security
|
2 |
A. Juels, "RFID Security and Privacy : A research survey", selected Areas in Communications, IEEE Journal, 2006
|
3 |
S.A.Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Comp., volume 2802 of LNCS, pages 201-212, 2004.
|
4 |
A. Bongdanov, etal, " Hash Functions and RFID Tags: Mind the Gap," Proc. of the CHES08, V. 5154 of LNCS, p.283-299, 2008
|
5 |
M. Feldhofer, etal, "Strong Authentication for RFID Systems Using the AES Algorithm," Proc. of the CHES04, V.3156, p.85-140, 2004
|
6 |
Faouzi Kamoun, "RFID System Management: State-of-the Art and Open Research Issues", IEEE Transaction on Network and Service Management, v.6, n.3, Sep, p.190-1205, 2009
DOI
ScienceOn
|
7 |
H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing, Vol. 4, No. 4, 2007, pp.337-340.
DOI
ScienceOn
|
8 |
Faouzi Kamoun. "RFID System Management: State-of-the Art and Open Research Issues" IEEE Transactions on Network and Service Management, V.6, N. 3, pp.190-205, Sep. 2009
DOI
ScienceOn
|