1. Secure and Serverless RFID Authentication and Search Protocols
2. [2] S. I. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, “S3PR : Secure Serverless Search Protocols for RFID,” Proc. 2nd International Conference on Information Security and Assurance (ISA), Busan, Korea, pp. 187-192, April 2008.
3. [3] S. I. Ahamed, F. Rahman, E. Hoque, F. Kawsar, and T. Nakajima, “Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol,” Int. J. Security and Its Applications, vol. 2, no. 4, pp. 57-66, Oct. 2008.
4. [4] T. Y. Won, J. Y. Chun, and D. H. Lee, “Strong Authentication Protocol for Secure RFID Tag Search Without Help of Central Database,” Proc. 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), Shanghai, China, vol. 2, pp. 153-158, Dec. 2008.
5. [5] Md. E. Hoque, F. Rahman, S. I. Ahamed, and J. H. Park, “Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments,” Wireless Personal Communications, vol. 55, no. 1, pp. 65-79, July 2009.