:::

詳目顯示

回上一頁
題名:安全的RFID標籤存取控制
書刊名:明新學報
作者:葉慈章 引用關係林儷珊
作者(外文):Yeh, Tzu-changLin, Li-shan
出版日期:2014
卷期:40:2
頁次:頁83-94
主題關鍵詞:安全隱私存取控制RFIDSecurityPrivacyAccess control
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:4
期刊論文
1.Chen, Y. Y.、Tsai, M. L.、Jan, J. K.(2011)。The design of RFID access control protocol using the strategy of indefinite-index and challenge-response。Computer Communications,34(3),250-256。  new window
2.Roberts, C. M.(2006)。Radio frequency identification (RFID)。Computers & Security,25(1),18-26。  new window
3.Aragones-Vilella, J.、Martinez-Balleste, A.、Solanas, A.(2007)。A Brief Survey on RFID Privacy and Security。Lecture Notes in Engineering and Computer Science,2166(1),1488-1493。  new window
4.Chen, Y.、Chou, J. S.、Sun, H. M.(2008)。A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems。Computer Networks: The International Journal of Computer and Telecommunications Networking,52(12),2373-2380。  new window
5.Cheng, Z. Y.、Liu, Y.、Chang, C. C.、Chang, S. C.(2012)。Advanced Constantly Updated RFID Access Control Protocol Using Challenge-Response and Indefinite-Index。Innovative Computing, Information and Control,8(12),8341-8354。  new window
6.Choi, E. Y.、Lee, D. H.、Lim, J. I.(2009)。Anti-cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID systems。Computer Standards and Interfaces,31(6),1124-1130。  new window
7.Gao, L.、Ma, M.、Shu, Y.、Wei, Y.(2014)。An Ultralightweight RFID Authentication Protocol with CRC and Permutation。Network and Computer Applications,41,37-46。  new window
8.Guo, C.、Zhang, Z. J.、Zhu, L. H.、Tan, Y. A.、Yang, Z.(2014)。A Novel Secure Group RFID Authentication Protocol。China Universities of Posts and Telecommunications,21(1),94-103。  new window
9.Juels, A.、Molner, D.、Wagner, D.(2007)。Security and Privacy Issues in E-passports。IEEE Security and Privacy,5(6),61-64。  new window
10.Kim, J.、Yang, C.、Jeon, J.(2007)。A Research on Issues Related to RFID Security and Privacy。IFIP Advances in Information and Communication Technology,252,412-420。  new window
11.Safkhani, M.、Peris-Lopez, P.、Hernandez-Castro, J.、Bagheri, N.(2014)。Cryptanalysis of the Cho et al. Protocol: A Hash-Based RFID Tag Mutual Authentication Protocol。Computational and Applied Mathematics,259(B),571-577。  new window
12.Weis, S. A.、Sarma, S.、Rivest, R.、Engels, D.(2003)。Security and Privay Aspects of Low-Cost Radio Frequency Identification Systems。Lecture Notes in Computer Science,2802,201-212。  new window
13.Chien, H. Y.、Chen, C. H.(2007)。Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards。Computer Standards & Interfaces,29(2),254-259。  new window
14.Ohkubo, M.、Suzuki, K.、Kinoshita, S.(2005)。RFID Privacy Issues and Technical Challenges。Communications of the ACM,48(9),66-71。  new window
15.Rieback, M. R.、Crispo, B.、Tanenbaum, A. S.(2006)。The Evolution of RFID Security。IEEE Pervasive Computing,5(1),62-69。  new window
16.Rotter, P.(2008)。A Framework for Assessing RFID System Security and Privacy Risks。IEEE Security & Privacy,7(2),70-77。  new window
17.Weinstein, R.(2005)。RFID: A Technical Overview and Its Application to the Enterprise。IT Professional,7(3),27-33。  new window
會議論文
1.Chien, H. Y.(2006)。Secure Access Control Schemes for RFID Systems with Anonymity。7th International Conference on Mobile Data Management,96。  new window
2.Karjoth, G.、Moskowitz, P. A.(2005)。Disabling RFID Tags with visible confirmation: Clipped Tags are silenced。The ACM Workshop on Privacy in the Electronic Society,27-30。  new window
3.Safkhani, M.、Bagheri, N.、Naderi, M.(2011)。Vulnerabilities in a New RFID Access Control Protocol。Internet Technology and Secured Transactions Conference。Abu Dhabi:Khalifa University。  new window
4.Zhang, L.、Zhou, H.、Kong, R.、Yang, F.(2005)。An Improved Approach to Security and Privacy of RFID Application System。Wireless Communications, Networking and Mobile Computing Conference,1195-1198。  new window
5.Juels, A.、Rivest, R. L.、Szydlo, M.(2003)。The blocker tag: selective blocking of RFID tags for consumer privacy。8th ACM Conference on Computer and Communications Security,(會議日期: 2003/10/27-10/30)。Washington:Association for Computing Machinery。103-111。  new window
圖書
1.陳昱仁、廖耕億、許建隆、林仲志、鍾乾癸(2009)。RFID概論。臺北:華泰文化。  延伸查詢new window
其他
1.EPCglobal Inc.(2008)。EPCglobal Tag Data Standards Version 1.4,http://www.gs1.org/gsmp/kc/epcglobal/tds/tds_1_4-standard-20080611.pdf, 2014/01/10。  new window
2.AIM(20110520)。What is RFID?,http://www.aimglobal.org/technologies/RFID/what_is_rfid.asp。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE