1 |
Yu Tian-tian, Feng Quan-yuan, "A Security RFID Authentication Protocol Based on Hash Function", 2009 International Symposium on Information Engineering and Electronic Commerce, pp.804-807, 2009.
|
2 |
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographic approach to privacy-friendly tags", In RFID Privacy Workshop, 2003.
|
3 |
M. Ohkubo, K.Suzuki and S. Kinoshita, "Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID", Proceedings of the SCIS 2004, pp.719-724, 2004.
|
4 |
Boyeon Song, and Chris J Mitchell, "RFID Authentication Protocol for Low-cost Tags", ACM Conference on Wireless Network Security(WiSec'08), 2008.
|
5 |
D. Molnar and D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures," ACM Conference Commun. Comput. Security(CCS '04), pp. 210-219, 2004.
|
6 |
S. Sarma, S. Weis, and D. Engels, "RFID Systems and Security and Privacy Implications," Workshop on Cryptographic Hardware and Embedded Systems, pp.454-470, 2002.
|
7 |
S. S. Yeo, K. Sakurai, S. E. Choi, K. S. Yang, and S. K. Kim, "Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard", In Proceedings of Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, Vol. 4743, pp.245-254, 2007.
|
8 |
V. Berstis, Fundamentals of Grid Computing, Reading Mass, IBM Redbook, 2002.
|
9 |
I. Foster and C. Kesselman and S. Tuecke, "The Anatomy of the Grid", The International Journal of High Performance Computing Applications, vol. 15, no.3, pp.200-222, 2001.
DOI
ScienceOn
|
10 |
Li, C., Xiao, N., Yang, X., "Application availability measurement in computational grid", Proceedings of the 2nd workshop on Grid and Cooperative Computing (GCC2003), Springer LNCS 3032, pp. 151-154, 2003.
|
11 |
Chunjiang Li, Nong Xiao, and Xuejun Yang., "Predicting the Reliability of Resources in Computational Grid," Grid and Cooperative Computing 2004, LNCS 3251, pp. 233-240, 2004
|
12 |
이춘희, "그리드퓨팅(Grid Computing)", 정보처리학회논문지, Vol 10(1), 2003.
|