Author:
Chen Chin-Ling,Chien Chih-Feng
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference27 articles.
1. Ayoade J. (2006) Security implications in RFID and authentication processing framework. Computers & Security 25(3): 207–212
2. Chen C. L., Den Y. Y. (2009) Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. Engineering Applications of Artificial Intelligence 22(8): 1284–1291
3. Chien H. Y., Chen C. H. (2007) Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards and Interfaces 29(2): 254–259
4. EPCglobal, Inc. URL: http://www.epcglobalinc.org/ . Accessed November 17, 2011.
5. Fouladgar, S., & Afifi, H. (2007). An efficient delegation and transfer of ownership protocol for RFID tags. In The first international EURASIP workshop on RFID technology (RFID 2007), September 24–25, Vienna, Austria.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献