Author:
Wang Hongbing,Li Yingjiu,Zhang Zongyang,Zhao Yunlei
Publisher
Springer International Publishing
Reference22 articles.
1. Bellare, M.: New proofs for NMAC and HMAC: security without collision resistance. J. Cryptol. 2006(1), 602–619 (2006)
2. Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An efficient forward private RFID protocol. In: ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, Usa, November, pp. 43–53 (2009)
3. Blass, E., Elkhiyaoui, K., Molva, R.: Tracker: security and privacy for RFID-based supply chains. In: NDSS 2011. The Internet Society (2011)
4. Lecture Notes in Computer Science;S Cai,2012
5. Čapkun, S., Buttyn, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: SASN, pp. 21–32 (2003)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DE-Sword: Incentivized Verifiable Tag Path Query in RFID-enabled Supply Chain Systems;IEEE Transactions on Dependable and Secure Computing;2020
2. Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution;IEEE Transactions on Dependable and Secure Computing;2020
3. An Efficient Authentication Protocol for RFID-Based Supply Chains;Advances in Intelligent Systems and Computing;2018-11-05
4. An RFID Path Authentication Protocol Based on Chebyshev Polynomials;Advances in Intelligent Systems and Computing;2018-11-05
5. A Lightweight Path Authentication Protocol for RFID-Based Supply Chains;2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE);2018-08