Author:
Lee Cheng-Chi,Chen Chi-Tung,Li Chun-Ta,Wu Ping-Hsien
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference42 articles.
1. Chen, Y. Y., Tsai, M. L., & Jan, J. K. (2011). The design of RFID access control protocol using the strategy of indefinite-index and challenge-response. Computer Communications, 34(3), 250–256.
2. Chien, H. Y. (2006). Secure access control schemes for RFID systems with anonymity. In Proceedings of the 7th international conference on mobile data management.
3. Chien, H. Y. (2007). SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(3), 337–340.
4. Chien, H. Y., & Chen, C. H. (2007). Mutual-authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, 29(2), 254–259.
5. Chung, M. G., & Kim, Y. (2008). An integrated scheme for authentication and access control in a digital TV environment. In Proceedings of IEEE international conference on consumer electronics (pp. 1–2).
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献