Author:
Mamun Mohammad S. I.,Miyaji Atsuko,Rahman Mohammad S.
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Lecture Notes in Computer Science;A. Juels,2005
2. Lecture Notes in Computer Science;E. Kiltz,2011
3. Lecture Notes in Computer Science;N.J. Hopper,2001
4. Cid, C., Robshaw, M.: The eSTREAM Portfolio 2009 Annual Update (July 2009),
http://www.ecrypt.eu.org/stream/
5. Katz, J., Shin, J.S., Smith, A.: Parallel and concurrent security of the HB and HB+ protocols. Journal of Cryptology 23(3), 402–421 (2010)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT;Peer-to-Peer Networking and Applications;2020-11-21
2. OTP-IoT: An ownership transfer protocol for the Internet of Things;Journal of Information Security and Applications;2018-12
3. SupAUTH: A new approach to supply chain authentication for the IoT;Computational Intelligence;2018-03-05
4. RFID Path Authentication, Revisited;2014 IEEE 28th International Conference on Advanced Information Networking and Applications;2014-05
5. A Scalable and Secure RFID Ownership Transfer Protocol;2014 IEEE 28th International Conference on Advanced Information Networking and Applications;2014-05