4.5 Article

A Hash-Based RFID Security Protocol for Strong Privacy Protection

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

On Ultralightweight RFID Authentication Protocols

Paolo D'Arco et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2011)

Article Computer Science, Theory & Methods

Parallel and Concurrent Security of the HB and HB+ Protocols

Jonathan Katz et al.

JOURNAL OF CRYPTOLOGY (2010)

Article Computer Science, Information Systems

Defining Strong Privacy for RFID

Ari Juels et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2009)

Article Computer Science, Information Systems

OpenTag: Privacy Protection for RFID

Henry Holtzman et al.

IEEE PERVASIVE COMPUTING (2009)

Article Engineering, Electrical & Electronic

A New Design of Wearable Token System for Mobile Device Security

Da-Zhi Sun et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2008)

Review Computer Science, Artificial Intelligence

Lightweight cryptographic authentication in passive RFID-tagged systems

Selwyn Piramuthu

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2008)

Article Engineering, Electrical & Electronic

An efficient modular exponentiation algorithm against simple power analysis attacks

Da-Zhi Sun et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2007)

Article Computer Science, Hardware & Architecture

SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity

Hung-Yu Chien

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2007)

Article Engineering, Electrical & Electronic

RFID security and privacy: A research survey

A Juels

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)