Provably Secure Grouping-Proofs for RFID Tags
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
A cross-layer framework for privacy enhancement in RFID systems
Pervasive and Mobile Computing
rfidDOT: RFID delegation and ownership transfer made simple
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A Security and Performance Evaluation of Hash-Based RFID Protocols
Information Security and Cryptology
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Secure EPC Gen2 Compliant Radio Frequency Identification
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Security of RFID Protocols -- A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
The security of EPC Gen2 compliant RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Untraceability of RFID protocols
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
SEAS: a secure and efficient anonymity scheme for low-cost RFID tags
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Refresh: weak privacy model for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Lightweight RFID authentication with forward and backward security
ACM Transactions on Information and System Security (TISSEC)
Energy-efficient polling protocols in RFID systems
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
ACSP: A novel security protocol against counting attack for UHF RFID systems
Computers & Mathematics with Applications
His late master's voice: barking for location privacy
SP'11 Proceedings of the 19th international conference on Security Protocols
Cryptography and Security
Simple Lightweight Authentication Protocol: Security and Performance Considerations
International Journal of Business Data Communications and Networking
Informative counting: fine-grained batch authentication for large-scale RFID systems
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing
Randomized skip lists-based private authentication for large-scale RFID systems
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing
CRFID: An RFID system with a cloud database as a back-end server
Future Generation Computer Systems
Personal and Ubiquitous Computing
Hi-index | 0.00 |
One of the challenges in pervasive computing is communication between a mobile user's terminal and the continuously changing local environment. Bluetooth is one potential option for providing connectivity, but its usage is hindered by the time consuming ...