相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server
Zhibo Wang et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2019)
Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing
Zhibo Wang et al.
IEEE COMMUNICATIONS MAGAZINE (2019)
Tash: Toward Selective Reading as Hash Primitives for Gen2 RFIDs
Qiongzheng Lin et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2019)
RMTS: A robust clock synchronization scheme for wireless sensor networks
Xuxin Zhang et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)
On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks
Honglong Chen et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2018)
Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems
Honglong Chen et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
Prosanta Gope et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Fast Identification of Blocked RFID Tags
Xiulong Liu et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2018)
Mobility Dataset Generation for Vehicular Social Networks Based on Floating Car Data
Xiangjie Kong et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)
MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems
Honglong Chen et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)
Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags
Kai Lin et al.
IEEE ACCESS (2018)
Efficient Physical-Layer Unknown Tag Identification in Large-scale RFID Systems
Feng Zhu et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2017)
A Time-Efficient Pair-Wise Collision-Resolving Protocol for Missing Tag Identification
Lijuan Zhang et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2017)
Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels
Wei Gong et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2017)
RFID Estimation With Blocker Tags
Xiulong Liu et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2017)
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems
Ju-min Zhao et al.
SECURITY AND COMMUNICATION NETWORKS (2017)
Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags
Honglong Chen et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
DTD: A Novel Double-Track Approach to Clone Detection for RFID-Enabled Supply Chains
Jun Huang et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2017)
Cost-effective barrier coverage formation in heterogeneous wireless sensor networks
Zhibo Wang et al.
AD HOC NETWORKS (2017)
Achieving location error tolerant barrier coverage for wireless sensor networks
Zhibo Wang et al.
COMPUTER NETWORKS (2017)
An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel
Min Chen et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2016)
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
Ala Al-Fuqaha et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)
Deterministic Detection of Cloning Attacks for Anonymous RFID Systems
Kai Bu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2015)
Accurate and Efficient Object Tracking Based on Passive RFID
Lei Yang et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2015)
An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
Debiao He et al.
IEEE INTERNET OF THINGS JOURNAL (2015)
Approaching the time lower bound on cloned-tag identification for large RFID systems
Kai Bu et al.
AD HOC NETWORKS (2014)
Fault-Tolerant RFID Reader Localization Based on Passive RFID Tags
Weiping Zhu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Missing-Tag Detection and Energy-Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels
Wen Luo et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2014)
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems
Kai Bu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
Efficient Protocols for Identifying the Missing Tags in a Large RFID System
Tao Li et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2013)
Time- and Energy-efficient Detection of Unknown Tags in Large-scale RFID Systems
Xiulong Liu et al.
2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013) (2013)
A Hash-Based RFID Security Protocol for Strong Privacy Protection
Da-Zhi Sun et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2012)
Probabilistic Analysis of Blocking Attack in RFID Systems
Ehsan Vahedi et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)
Efficient Techniques for Monitoring Missing RFID Tags
Chiu C. Tan et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2010)
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
Hung-Yu Chien
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2007)
HB-MP: A further step in the HB-family of lightweight authentication protocols
J. Munilla et al.
COMPUTER NETWORKS (2007)
RFID security and privacy: A research survey
A Juels
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)