RFID security and privacy: Concepts, protocols, and architectures

被引:0
|
作者
Henrici, Dirk [1 ]
机构
[1] University of Kaiserslautern, 67653 Kaiserslautern, Germany
关键词
172;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1 / 280
相关论文
共 50 条
  • [31] RFID systems and security and privacy implications
    Sarma, SE
    Weis, SA
    Engels, DW
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 454 - 469
  • [32] Differential Privacy by Typing in Security Protocols
    Eigner, Fabienne
    Maffei, Matteo
    2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 272 - 286
  • [33] IT Security. Concepts - Procedures - Protocols
    Ockenfeld, Marlies
    INFORMATION-WISSENSCHAFT UND PRAXIS, 2012, 63 (01): : 64 - 65
  • [34] Privacy-Preserving Authorized RFID Authentication Protocols
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, 2014, 8651 : 108 - 122
  • [35] Relations among Notions of Privacy for RFID Authentication Protocols
    Moriyama, Daisuke
    Matsuo, Shin'ichiro
    Ohkubo, Miyako
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (01) : 225 - 235
  • [36] Untraceable Analysis of Scalable RFID Security Protocols
    Chen, Xiuqing
    Ma, Kai
    Geng, Deqin
    Zhai, Jingxuan
    Liu, Wei
    Zhang, Hongwei
    Zhu, Tingting
    Piao, Xue
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (03) : 1747 - 1767
  • [37] A Salient Missing Link in RFID Security Protocols
    Imran Erguler
    Emin Anarim
    Gokay Saldamli
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [38] Scalability and Security Conflict for RFID Authentication Protocols
    Imran Erguler
    Emin Anarim
    Wireless Personal Communications, 2011, 59 : 43 - 56
  • [39] Inductive Method for Evaluating RFID Security Protocols
    Liu, Defu
    Yang, Guowu
    Huang, Yong
    Wu, Jinzhao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [40] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389