Author:
Shen Jian,Tan Haowen,Zhang Yan,Sun Xingming,Xiang Yang
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference34 articles.
1. Bellare M, Canetti R, Krawczyk H (1998) A modular approach to the design and analysis of authentication and key exchange protocols. In: Thirtieth annual ACM symposium on theory of computing. ACM, pp 419–428
2. Bolotnyy L, Robins G (2006) Generalized yoking-proofs for a group of rfid tags. In: 2006 third annual international conference on mobile and ubiquitous systems: Networking services, pp 1–4
3. Chien H -Y, Liu S -B (2009) Tree-based rfid yoking proof. In: 2009 international conference on networks security, wireless communications and trusted computing, vol 1, pp 550–553
4. Cho J -S, Yeo S -S, Hwang S, Rhee S -Y, Kim S K (2008) Enhanced yoking proof protocols for rfid tags and tag groups. In: 2008 22nd international conference on advanced information networking and applications, pp 1591–1596
5. Dhal S, Gupta I S (2014) A new authentication protocol for rfid communication in multi-tag arrangement. In: 2014 international conference on computing for sustainable global development (Indiacom), pp 668–673
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献