Author:
Pandian M. Thurai,Sukumar R.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference21 articles.
1. Wang, B., & Ma, M. (2012). A server independent authentication scheme for RFID systems. IEEE Transactions on Industrial Informatics,
8, 689–696.
2. Garfinkel, S. L., Juels, A., & Pappu, R. (2005). RFID privacy: An overview of problems and proposed solutions. IEEE Security Privacy,
3, 34–43.
3. Tan, C. C., Sheng, B., & Li, Q. (2008). Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications,
7, 1400–1407.
4. Qian, C., Liu, Y., Ngan, H., & Ni, L. M. (2008). ASAP: Scalable collision arbitration for large RFID systems. IEEE Transactions on Parallel and Distributed Systems,
24, 1277–1288.
5. Bonuccelli, M. A., Lonetti, F., & Martelli, F. (2007). Tree slotted ALOHA: A new protocol for tag identification in RFID networks. Elsevier Ad Hoc Networks.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献