:::

詳目顯示

回上一頁
題名:無需TTP的RFID所有權移轉
書刊名:明新學報
作者:葉慈章 引用關係戴嘉良
作者(外文):Yeh, Tzu-changDai, Jia-liang
出版日期:2014
卷期:40:1
頁次:頁109-121
主題關鍵詞:安全隱私所有權移轉RFIDSecurityPrivacyOwnership transfer
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:2
期刊論文
1.Erguler, I.、Anarim, E.(2010)。Scalability and security conflict for RFID authentication protocols。Wireless Personal Communications,59(1),43-56。  new window
2.Kapoor, G.、Zhou, W.、Piramuthu, S.(2009)。Challenges associated with RFID tag implementations in supply chains。European Journal of Information Systems,18(6),526-533。  new window
3.Kapoor, G.、Zhou, W.、Piramuthu, S.(2011)。Multi-tag and multi-owner RFID ownership transfer in supply chains。Decision Support Systems,52(1),258-270。  new window
4.Kapoor, G.、Piramuthu, S.(2012)。Single RFID Tag Ownership Transfer Protocols。IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Reviews,42(2),164-173。  new window
5.Yang, M. H.(2011)。Across-authority lightweight ownership transfer protocol。Electronic Commerce Research and Applications,10(4),375-383。  new window
6.Fouladgar, S.、Afifi, H.(2007)。A simple privacy protecting scheme enabling delegation and ownership transfer for RFID tags。Journal of Communications,2(6),6-13。  new window
7.Song, B.、Mitchell, J. C.(2011)。Scalable RFID security protocols supporting tag ownership transfer。Computer Communications,34(4),556-566。  new window
8.Chen, Y. Y.、Tsai, M. L.、Jan, J. K.(2011)。The design of RFID access control protocol using the strategy of indefinite-index and challenge-response。Computer Communications,34(3),250-256。  new window
9.Peris-Lopez, P.、Hemandez-Castro, J. C.、Estevez-Tapiador, J. M.(2009)。An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification。Journal of Information Science and Engineering,25(1),33-57。  new window
10.Peris-Lopez, P.、Hemandez-Castro, J. C.、Tapiador, J. M. E.、Li, T.、Li, Y.(2010)。Vulnerability analysis of RFID protocols for tag ownership transfer。Computer Networks,54(9),1502-1508。  new window
11.H' Shen, Q. Z.、Li, X.、Zeadall, S(2008)。Enabling Next-Generation RFID Applications。Solutions and Challenges.Computer,47(9),21-28。  new window
12.Rizomiliotis, P.、Rekleitis, E.、Gritzalis, S.(2009)。Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags。Communications Letters,13(4),274-276。  new window
13.Roberts, C. M.(2006)。Radio frequency identification (RFID)。Computers & Security,25(1),18-26。  new window
14.Chien, H. Y.、Chen, C. H.(2007)。Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards。Computer Standards & Interfaces,29(2),254-259。  new window
15.Lin, I. C.、Yang, C. W.、Tsaur, S. C.(2010)。Nonidentifiable RFID Privacy Protection with Ownership Transfer。International Journal of Innovative Computing, Information and Control,6(5),2341-2352。  new window
16.Chen, C. L.、Lai, Y. L.、Chen, C. C.、Deng, Y. Y.、Hwang, Y. C.(2011)。RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards。International Journal of Network Security,13(1),41-48。  new window
會議論文
1.Yoon, E. J.、Yoo, K. Y.(2008)。Two security problems of RFID security method with ownership transfer。2008 IFIP International Conference on Network and Parallel Computing,68-73。  new window
2.Song, B.(2008)。RFID tag ownership transfer。Workshop on RFID Security-RFIDSec'08。  new window
3.Cai, S.、Li, Y.、Li, T.、Deng, R. H.(2009)。Attacks and improvements to an RIFD mutual authentication protocol and its extensions。The Second ACM Conference on Wireless Network Security。  new window
4.Deursen, T. V.、Mauw, S.、Radomirovic, S.、Vullers, P.(2009)。Secure ownership and ownership transfer in RFID systems。The 14th European Conference on Research in Computer Security。  new window
5.Zuo, Y.(2010)。Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags。2010 43rd Hawaii International Conference on System Science。  new window
6.Song, B.、Mitchell, C. J.(2008)。RFID authentication protocol for low-cost tags。First ACM Conference on Wireless Network Security,140-147。  new window
7.Weis, S.、Sarma, S.、Rivest, R.、Engels, D.(2004)。Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems。The 1st International Conference on Security in Pervasive Computing,201-212。  new window
8.Osaka, K.、Takagi, T.、Yamazaki, K.、Takahashi, O.(2006)。An efficient and secure RFID security method with ownership transfer。IEEE International Conference on Computational Intelligence and Security,(會議日期: 3-6 November)。Guangzhou。1090-1095。  new window
9.Song, B.、Mitchell, J. C.(2009)。Scalable RFID Pseudonym Protocol。The Third International Conference on Network and System Security-NSS 2009, IEEE Computer Society。Queensland, Australia。216-224。  new window
學位論文
1.Lee, L. A.(2005)。Protecting user privacy with dynamic identity-based scheme for low-cost passive RFID tags(碩士論文)。National Chiao Tung University,Hsinchu。  new window
2.Song, B.(2009)。RFID Authentication Protocols using Symmetric Cryptography(博士論文)。Royal Holloway University of London。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE