Author:
Guo Fuchun,Mu Yi,Susilo Willy,Varadharajan Vijay
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference44 articles.
1. Armknecht, F., Sadeghi, A. R., Visconti, I., & Wachsmann, C. (2010). On RFID privacy with mutual authentication and tag corruption. In Proceedings of ACNS’10, LNCS (Vol. 6123, pp. 493–510).
2. Avoine, G., Dysli, E., & Oechslin, P. (2005). Reducing time complexity in RFID systems. In Proceedings of SAC’05, LNCS (Vol. 3897, pp. 291–306).
3. Berbain, C., Billet, O., Etrog, J., & Gilbert, H. (2009). An efficient forward private RFID protocol. In Proceedings of ACM CCS’09 (pp. 43–53). ACM.
4. Billet, O., Etrog, J., & Gilbert, H. (2010). Lightweight privacy preserving authentication for RFID using a stream cipher. In Proceedings of FSE’10, LNCS (Vol. 6147, pp. 55–74).
5. Boneh, D., & Boyen, X. (2004). Efficient selective-id secure identity-based encryption without random oracles. In Proceedings of EUROCRYPT’04, LNCS (Vol. 3027, pp. 223–238).
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献