:::

詳目顯示

回上一頁
題名:具身分鑑別的RFID所有權移轉
書刊名:明新學報
作者:葉慈章 引用關係王志翔
作者(外文):Yeh, Tzu-changWang, Zhi-xiang
出版日期:2013
卷期:39:2
頁次:頁143-156
主題關鍵詞:無線射頻識別系統安全隱私所有權轉移RFIDSecurityPrivacyOwnership transfer
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:15
期刊論文
1.Chen, C. L.、Chien, C. F.(2013)。An ownership transfer scheme using mobile RFIDs。Wireless Personal Communications,68(3),1093-1119。  new window
2.Chen, C. L.、Lai, Y. L.、Chen, C. C.、Deng, Y. Y.、Hwang, Y. C.(2011)。RFID ownership transfer authorization systems conforming EPC global Class-1 Generation-2 standards。International Journal of Network Security,12(3),221-228。  new window
3.Due, D. N.、Kim, K.(2010)。Defending RFID authentication protocols against DoS attacks'。Computer Communications,34(3),384-390。  new window
4.Erguler, I.、Anarim, E.(2010)。Scalability and security conflict for RFID authentication protocols。Wireless Personal Communications,59(1),43-56。  new window
5.Kapoor, G.、Zhou, W.、Piramuthu, S.(2009)。Challenges associated with RFID tag implementations in supply chains。European Journal of Information Systems,18(6),526-533。  new window
6.Kapoor, G.、Zhou, W.、Piramuthu, S.(2011)。Multi-tag and multi-owner RFID ownership transfer in supply chains。Decision Support Systems,52(1),258-270。  new window
7.Kapoor, G.、Piramuthu, S.(2012)。Single RFID Tag Ownership Transfer Protocols。IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Reviews,42(2),164-173。  new window
8.Lin, I, C.、Yang, C. W.、Tsaur, S. C.(2010)。Non identifiable RFID privacy protection with ownership transfer。International Journal of Innovative Computing Information and Control,6(5),2341-2351。  new window
9.Sheng, Q. Z.、Li, X.、Zeadally, S.(2009)。Enabling next-generation RFID applications: solutions and challenges。Computer,41(9),21-28。  new window
10.Yang, M. H.(2011)。Across-authority lightweight ownership transfer protocol。Electronic Commerce Research and Applications,10(4),375-383。  new window
11.Yang, M. H.(2012)。Secure multiple group ownership transfer protocol for mobile RJFID。Electronic Commerce Research and Applications,11(4),361-373。  new window
12.Zhou, W.、Yoon, E. J.、Piramuthu, S.(2012)。Simultaneous multi-level RFID tag ownership & transfer in health care environments。Decision Support Systems,54(1),98-108。  new window
13.Fouladgar, S.、Afifi, H.(2007)。A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags。Journal of Communications,2(6),6-13。  new window
14.Osaka, K.、Takagi, T.、Yamazaki, K.、Takahashi, O.(2006)。An efficient and secure RFID security method with ownership transfer。LNCS,4456,778-787。  new window
15.Peris-Lopez, P.、Hemandez-Castro, J. C.、Estevez-Tapiador, J. M.、Li, T. Y.、Li, Y. J.(2010)。Vulnerability analysis of RFID protocols for tag ownership transfer。Computer Networks,54(9),1502-1508。  new window
16.Song, B.、Mitchell, J. C.(2011)。Scalable RFID security protocols supporting tag ownership transfer。Computer Communications,34(4),556-566。  new window
17.Rizomiliotis, P.、Rekleitis, E.、Gritzalis, S.(2009)。Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags。Communications Letters,13(4),274-276。  new window
18.Roberts, C. M.(2006)。Radio frequency identification (RFID)。Computers & Security,25(1),18-26。  new window
會議論文
1.Cai, S.、Li, Y.、Li, T.、Deng, R.(2009)。Attacks and improvements to an RFID mutual authentication protocol and its extensions。the Second A CM Conference on Wireless Network Security (WiSec'09),51-58。  new window
2.Yoon, E. J.、Yoo, K. Y.(2008)。Two security problems of RFID security method with ownership transfer。2008 IFIP International Conference on Network and Parallel Computing,68-73。  new window
3.Song, B.(2008)。RFID tag ownership transfer。Workshop on RFID Security-RFIDSec'08。  new window
4.Song, B.、Mitchell, C. J.(2008)。RFID authentication protocol for low-cost tags。First ACM Conference on Wireless Network Security,140-147。  new window
學位論文
1.Lee, L. A.(2005)。Protecting user privacy with dynamic identity-based scheme for low-cost passive RFID tags(碩士論文)。National Chiao Tung University,Hsinchu。  new window
圖書
1.Song, B.、Mitchell, J. C.(2009)。Scalable RJFID pseudonym protocol。Network and System Security。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE