1. Efficient RFID authentication using elliptic curve cryptography for the Internet of Things;Shen;Wirel. Pers. Commun.,2017
2. CPK-ECC based mutual authentication protocol for large-scale RFID system;Pan;J. Commun.,2017
3. Tuyls, P., and Batina, L. (2006). Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, 13–17 February 2005, Springer.
4. An ECDLP-based randomized key RFID authentication protocol;Zhang;Proceedings of the 2011 International Conference on Network Computing and Information Security,2011
5. Liao, Y.P., and Hsiao, C.M. (2013). Advances in Intelligent Systems and Applications-Volume 2: Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, 12–14 December 2012, Springer.