1 |
C.C. Tan, B. Sheng, and Q. Li, "Secure and Serverless RFID Authentication and Search Protocols," IEEE Transactions on Wireless Communications, vol. 7, no. 3, pp. 1400-1407, Apr. 2008.
DOI
|
2 |
A. Bogdanov, G. Leander, C. Paar, and A. Poschmann, "Hash Functions and RFID Tags: Mind the Gap," Proc. of the CHES08, LNCS 5154, pp. 283-299, 2008.
|
3 |
A. Juels and S.A. Weis, "Authenticating Pervasive Devices with Human Protocols," Proc. of the CRYPTO05, LNCS 3126, pp. 293-308, 2005.
|
4 |
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong Authentication for RFID Systems Using the AES Algorithm," Proc. of the CHES04, LNCS 3156, pp. 85-140, 2004.
|
5 |
S.I. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, "S3PR: Secure Serverless Search Protocols for RFID," Proc. of the ISA08, pp. 187-192, Apr. 2008.
|
6 |
T. Won, J. Chun, and D. Lee, "Strong Authentication Protocol for Secure RFID Tag Search Without Help of Central Database," Proc. of the EUC, pp. 153-158, Dec. 2008.
|
7 |
임지환, 오희국, 양대헌, 이문규, 김상진, "강화된 사용자 프라이버시를 보장하는 효율적인 RFID 검색 프로토콜," 정보처리학회논문지, 16-C(3), pp. 347-356, 2009년 6월.
과학기술학회마을
DOI
ScienceOn
|