Publisher
Springer Berlin Heidelberg
Reference8 articles.
1. Juels, A.: Yoking-proofs for RFID Tags. In: Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Washington DC, USA, pp. 138–142 (2004)
2. Osaka, K., Takagi, T., Yamazaki, K., Takahash, O.: An Efficient and Secure RFID Method with Ownership Transfer. Computational Intelligence and Security 2, 1090–1095 (2006)
3. Jappinen, P., Hamalainen, H.: Enhanced RFID Security Method with Ownership Transfer. In: Proceedings of the International Conference on Computational Intelligence and Security, pp. 382–385 (2008)
4. Lei, H., Cao, T.: RFID Protocol enabling Ownership Transfer to protect against Tractability and Dos attacks. In: The First International Symposium on Data, Privacy and E-Commerce (ISDPE 2007), November 1-3, pp. 508–510 (2007)
5. Tripathy, S., Nandi, S.: Robust Mutual Authentication for Low cost RFID Systems. In: 2006 IEEE International Conference on Industrial Informatics, August 2006, pp. 949–954 (2006)