1 |
C. Lee "A Study on Effective using Security Routing based on Mobile Ad-hoc Networks," Int. J. of Security and Its Application, vol. 9, no. 7, 2015, pp. 141-152.
DOI
|
2 |
C. Lee "Security Authentication Technique using Hash Code in Wireless RFID Environments," Int. J. of Grid and Distributed Computing, vol. 11, no. 10, 2018, pp. 93-102.
DOI
|
3 |
J. Jung, H. Lee, and Y. Kim, "High Speed Collision Avoidance Algorithm for Active RFID Network System," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, June 2016, pp. 581-590.
DOI
|
4 |
R. Weinstein, "A Technical Overview and Its Application to the Enterprise," IT Professional, IEEE Computer Society, vol. 7, issue 3, June 2005, pp. 27-33.
DOI
|
5 |
H. Chow, K. Choy, W. Lee, and K. Laub, "Design of a RFID case-based Resource Management System for Warehouse Operations," J. of International Expert System with Applications, vol. 20, issue 4, May 2006, pp. 561-576.
|
6 |
C. Floerkemeier, D. Anarkat, T. Osinski, and M. Harrison, "PML Core Specification 1.0," Auto-ID Center Recommendation, Sept. 2003, pp. 5-25.
|
7 |
U. Karthaus and M. Fischer, "Fully integrated passive UHF RFID transponder IC with 16.7-uW minimum RF input power," J. of IEEE Journal for Solid-state Circuits, vol. 38, no. 10, Oct. 2003, pp. 1602-1608.
DOI
|
8 |
H. Yoon, M. Mohaisen, K. Chang, J. Bae, and G. Choi, "Performance Analysis of Wireless Communications between Tag and Reader in EPCglobal Gen-2 RFID System," J. of Korean Institute of Electromagnetic and Engineering and Science, vol. 18, no. 124, 2007, pp. 1047-1056.
DOI
|
9 |
K. Han and G. Yim, "Design of an RFID Authentication Protocol Using Nonlinear Tent-Map," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 10, Aug. 2014, pp. 1145-1152.
DOI
|