Author:
Amariucai George T.,Bergman Clifford,Guan Yong
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Dobkin, D.M.: The RF in RFID: passive UHF RFID in Practice. Elsevier Inc. (2008)
2. Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: AT&T Software Symposium (1999)
3. Lecture Notes in Computer Science;R. Mayrhofer,2007
4. Oshiba, T., Nebayashi, H.: Device pairing based on adaptive channel fluctuation control for large-scale organizations. In: IEEE Symposium on Computers and Communications, ISCC 2009, pp. 901–906 (2009)
5. Soriente, C., Tsudik, G., Uzun, E.: BEDA: button-enabled device association. In: International Workshop on Security for Spontaneous Interaction, IWSSI 2007 (2007)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol;Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks;2018-06-18
2. Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains;International Journal of Handheld Computing Research;2013-10