Author:
Molnar David,Soppera Andrea,Wagner David
Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. Avoine, G., Oechslin, P.: A scalable and provably secure hash-based RFID protocol. In: IEEE PerSec (2005)
2. Lecture Notes in Computer Science;M. Feldhofer,2004
3. Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792–807 (1986)
4. Juels, A.: Minimalist cryptography for RFID tags (2003), http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/minimalist/index.html
5. Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags (full version). To appear in Cryptology ePrint Archive (2005), http://www.eprint.iacr.org/2005/
Cited by
67 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献