Publisher
Springer International Publishing
Reference21 articles.
1. Mamun, M.S.I., Miyaji, A.: RFID path authentication, revisited. In: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp. 245–252. IEEE (2014)
2. Molnar, D., Soppera, A., Wagner, D.: A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In: International Workshop on Selected Areas in Cryptography, pp. 276–290. Springer, Heidelberg (2005)
3. Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A new framework for RFID privacy. In: European Symposium on Research in Computer Security, pp. 1–18. Springer, Heidelberg (2010)
4. Choo, K.-K.R., Bishop, M., Glisson, W.B., Nance, K.L.: Internet and cloud-of-things cybersecurity research challenges and advances. Comput. Secur. 74, 275–276 (2018)
5. Lin, C., He, D., Kumar, N., Choo, K.-K.R., Vinel, A., Huang, X.: Security and privacy for the internet of drones: challenges and solutions. IEEE Commun. Mag. 56(1), 64–69 (2018)