1 |
D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, Conference on Computer and Communications Secu-rity CCS'04, pp. 210-219, 2004
DOI
|
2 |
M. Ohkudo, K. Suzki, S. Kinoshita, Cryptographic approach to privacy-friendly tags, RFID Privacy Workshop, 2003
|
3 |
J. Yang, K. Ren, K. Kim, Security and privacy on authentication protocol for low-cost radio, the 2005 Symposium on Cryptography and Information Se-curity, 2005
|
4 |
J. Yang, J. Park, H. Lee, K. Kim, Mutual authen-tication protocol for low-cost RFID, Handout of the Encrypt Workshop on RFID and Lightweight Crypto, 2005
|
5 |
CC Tan, B Sheng, Q Li, Serverless search and auth-entication protocols for RFID, IEEE PerCom, 2007
DOI
|
6 |
S.A. Weis, S.E. Sarma, R,L.Rivest, D.W.Engels, Security and privacy aspects of low-cost radio frequency identification systems, Security in Per-vasive Computing 2003, LNCS No.2802, pp. 201-212, 2004
DOI
|
7 |
Y. Chen, J. Chou, H. Sun, A novel mutual authentication scheme based on quadratic residues for RFID systems, computer networks 52, pp. 2373-2380, 2008
DOI
ScienceOn
|