Author:
Dinarvand Negin,Barati Hamid
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference34 articles.
1. Finkenzeller, K. (2010). RFID handbook: Fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication. Hoboken: Wiley.
2. Chou, J. S. (2014). An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94. doi:
10.1007/s11227-013-1073-x
.
3. Park D. G., Boyd C., & TDawson E. (2000). Classification of authentication protocols: A practical approach. In Third international workshop, ISW 2000 Wollongong (pp. 194–208).
4. Liao, Y. P., & Hsiao, C. M. (2013). A secure ECC-based RFID authentication scheme using hybrid protocols. Advances in Intelligent Systems and Applications, 2, 1–13.
5. Juels, A. (2006). RFID security and privacy: A research surve. IEEE Journal on Selected Areas in Communications, 24, 381–394.
Cited by
55 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献