Funder
National Key Research and Development Project of China
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference17 articles.
1. Kfir Z, Wool A (2005) Picking virtual pockets using relay attacks on contact—less Smartcard Systems. In: Proceedings of the 1st Int’l Conference on Security and Privacy for Emerging Areas in Comm. Networks (Securecomm 05), IEEE CS Press, 2005, pp 47–58
2. Rotter P (2008) A Framework for Assessing RFID System Security and Privacy Risks. IEEE Pervasive Comput 7(2):70–77
3. Avoine G, Carpent X, Hernandez-Castro J (2016) Pitfalls in Ultralightweight Authentication Protocol Designs. IEEE Trans Mobile Comput 15(9):2317–2332
4. Peris-Lopez P, Hernandez-Castro JC, Estévez-Tapiador JM et al (2006) M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags. In: International Conference on Ubiquitous Intelligence and Computing, pp 912–923
5. Peris-Lopez P, Hernandez-Castro JC, Estévez-Tapiador JM et al (2006) LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In: Proceedings of 2nd Workshop on RFID Security, pp 12–14
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献