ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Lightweight Grouping-Proof for Post-Quantum RFID Security
Mapping Intimacies
◽
10.1109/swc50871.2021.00017
◽
2021
◽
Author(s):
Shouqin Lu
◽
Xiangxue Li
Keyword(s):
Rfid Security
◽
Grouping Proof
Download Full-text
Related Documents
Cited By
References
A survey on RFID security and provably secure grouping-proof protocols
International Journal of Internet Technology and Secured Transactions
◽
10.1504/ijitst.2010.037403
◽
2010
◽
Vol 2
(3/4)
◽
pp. 222
◽
Cited By ~ 3
Author(s):
Dang Nguyen Duc
◽
Divyan M. Konidala
◽
Hyunrok Lee
◽
Kwangjo Kim
Keyword(s):
Rfid Security
◽
Grouping Proof
◽
Provably Secure
Download Full-text
RFID security
IET Conference on Crime and Security
◽
10.1049/ic:20060328
◽
2006
◽
Author(s):
P. Royston
Keyword(s):
Rfid Security
Download Full-text
Design and analysis of a new RFID Security Protocol for Internet of things
2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)
◽
10.1109/isctt51595.2020.00010
◽
2020
◽
Author(s):
Zixuan Liu
◽
Jie Yu
Keyword(s):
Internet Of Things
◽
Security Protocol
◽
Rfid Security
Download Full-text
Design and implementation of a RFID security authentication protocol
2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA)
◽
10.1109/imsna.2013.6742826
◽
2013
◽
Author(s):
Lei Zhang
◽
Zicong Xiao
Keyword(s):
Authentication Protocol
◽
Rfid Security
◽
Design And Implementation
◽
Security Authentication
Download Full-text
An Interview with RFID Security Expert Ari Juels
IEEE Pervasive Computing
◽
10.1109/mprv.2008.4
◽
2008
◽
Vol 7
(1)
◽
pp. 10-11
Author(s):
Tadayoshi Kohno
Keyword(s):
Rfid Security
◽
Security Expert
Download Full-text
A Practical Experience with RFID Security
2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
◽
10.1109/mdm.2009.71
◽
2009
◽
Cited By ~ 3
Author(s):
Chun-Chieh Chen
◽
Inn-Tung Chen
◽
Chen-Mou Cheng
◽
Ming-Yang Chih
◽
Jie-Ren Shih
Keyword(s):
Practical Experience
◽
Rfid Security
Download Full-text
An Analysis of Provable Security Frameworks for RFID Security
Handbook of Computer Networks and Cyber Security
◽
10.1007/978-3-030-22277-2_25
◽
2020
◽
pp. 635-651
◽
Cited By ~ 1
Author(s):
Aakanksha Tewari
◽
B. B. Gupta
Keyword(s):
Provable Security
◽
Rfid Security
Download Full-text
RFID Security and Privacy
RFID Security
◽
10.1007/978-0-387-76481-8_3
◽
2008
◽
pp. 57-79
◽
Cited By ~ 6
Author(s):
Tassos Dimitriou
Keyword(s):
Security And Privacy
◽
Rfid Security
Download Full-text
Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms
Computational Science and Its Applications - ICCSA 2006 - Lecture Notes in Computer Science
◽
10.1007/11751632_30
◽
2006
◽
pp. 279-287
◽
Cited By ~ 1
Author(s):
Wonjoon Choi
◽
Byeong-hee Roh
Keyword(s):
Rfid Security
◽
Protection Method
Download Full-text
Vulnerability analysis and improvement of RFID grouping-proof protocols
Advances in Future Manufacturing Engineering
◽
10.1201/b18474-71
◽
2015
◽
pp. 359-362
Keyword(s):
Vulnerability Analysis
◽
Grouping Proof
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close