1 |
A. Juels, "RFID Security and Privacy: AResearch Survey," IEEE Journal on Selected Areas in Communications, 24(2): 381-394, Feb.2006.
DOI
|
2 |
Li Lu, Yunhao Liu and Xiang-Yang Li,"Refresh: Weak Privacy Model for RFID Systems", IEEE INFOCOM 2010.
|
3 |
Taeyang Eom, Jeong-Hyun, "Performance Evaluation of Authentication Protocol for Mobile RFID Privacy", Korean Institute of Communication and Information Sciences, Vol. 36, No 6, 2011. 6.
|
4 |
M. Ohkubo, K. Suzuki, and S. Kinoshita,"Hash-chain based forward-secure privacy protection scheme for low-cost RFID,"Proceedings of the SCIS 2010, pp. 719-724, 2010.
|
5 |
J. Daemen, V. Rijmen, " The Design of Rijndeal," AESThe advanced Encryption Standard, Springer-Verlog, Berlin, Heidelberg, New York, 2009.
|
6 |
D. Henrici and P. Muuller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers,"Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communication Security, pp. 149-153, Mar. 2008.
|
7 |
Le, X.H., Lee, S. and Lee, Y.K. "Two-tier user authentication scheme for heterogeneous sensor network", Proceedings of the 5th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), USA, 2009.
|
8 |
Y. Chen, W. Trappe, and R. P. Martin, "Detecting and localizing wireless spoofing attacks," in SECON'07: Proceedings of the 4th Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2007.
|
9 |
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proceedings of the Twelfth USENIX Security Symposium. Washington, DC, USA: USENIX Association, Aug. 2003, pp. 15-28.
|
10 |
Jin-seob Shin, Young-ho Park, "An Authentication Protocol using the EXOR and the Hash Function in RFID/USN," Korea Society of Industrial Information Systems, Vol. 12, No. 2, pp.24-29, 2007.6.
|
11 |
Hae-Soon Ahn, Ki-Dong Bu, "Improved Authentication Protocol for RFID/USN Environment", The Institute of Electronics and Information Engineers, Vol.46, No. CI-1, 2009.1.
|