4.2 Article

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems

Kai Bu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Hardware & Architecture

Fast Tag Searching Protocol for Large-Scale RFID Systems

Yuanqing Zheng et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2013)

Article Computer Science, Information Systems

Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization

Thomas F. La Porta et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2011)

Article Operations Research & Management Science

RFID for Better Supply-Chain Management through Enhanced Information Visibility

Dursun Delen et al.

PRODUCTION AND OPERATIONS MANAGEMENT (2010)

Article Computer Science, Information Systems

Critical RFID Privacy-Enhancing Technologies

Sarah Spiekermann et al.

IEEE SECURITY & PRIVACY (2009)

Article Engineering, Electrical & Electronic

Secure and serverless RFID authentication and search protocols

Chin C. Tan et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2008)