Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference33 articles.
1. Bilal, Z. (2015). Addressing security and privacy issues in low-cost RFID systems (Doctoral dissertation, PHD thesis, Royal Holloway, University of London).
2. Xie, L., Yin, Y., Vasilakos, A. V., & Lu, S. (2014). Managing RFID data: Challenges, opportunities and solutions. IEEE Communications Surveys and Tutorials, 16(3), 1294–1311.
3. Alagheband, M. R., & Aref, M. R. (2013). Unified privacy analysis of new-found RFID authentication protocols. Security and Communication Networks, 6(8), 999–1009.
4. Sohrabi-Bonab, Z., Alagheband, M. R., & Aref, M. R. (2013). Traceability analysis of quadratic residue-based RFID authentication protocols. In Eleventh annual international conference on privacy, security and trust (PST), 2013 (pp. 61–68). IEEE.
5. Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487–1508.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献