Batina L, Lee Y, Seys S, et al, "Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs", Personal and Ubiquitous Computing View Artical
Gul N. Khan, Jack Yu and Fei Yuan, "XTEA based Secure Authentication Protocol for RFID Systems. Ryerson University", ICCCN Workshops ,2011 View Artical
Peris-Lopez P, Orfila A, Hernandez-Castro J, et al, "Flaws on RFID grouping-proofs", Journal of Network and Computer Applications ,2011 View Artical
Eslam Gamal Ahmed, "Lightweight Mutual Authentication Protocol for Low Cost RFID Tags", International Journal of Network Security & Its Ap ,Vol.2 ,2010 View Artical
Ma C, Lin J, Wang Y, et al, "Offline RFID grouping proofs with trusted timestamps", Proceedings of the 11th IEEE International Confere ,2012 View Artical
Sato Y, Mitsugi J, Nakamura O, et al, "Theory and performance evaluation of group coding of RFID tags", IEEE Transactions on Automation Science and Engine ,2012 View Artical
Yang M H, "Secure multiple group ownership transfer protocol for mobile RFID", Electronic Commerce Research and Applications ,2012 View Artical
Yang M H, Hu H Y, "Protocol for ownership transfer across authorities:with the ability to assign transfer target", Journal of Security and Communication Networks ,2012 View Artical
Samad Rostampour, Mojtaba Eslamnezhad Namin, Mehdi Hosseinzadeh, "A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security", I.J. Modern Education and Computer Science ,2014 View Artical
Evangelos Rekleitis, Panagiotis Rizomiliotis, and Stefanos Gritzalis, "A holistic approach to RFID security and privacy", University of the Aegean ,2008 View Artical
Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu, "A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem", National Tsing Hua University ,Vol.31 ,2009 View Artical
Jian Shen, Haowen Tan, Yang Wang, Sai Ji, Jin Wang, "A Novel RFID Authentication Protocol for Multiple Readers and Tag Groups", Advanced Science and Technology ,2014 View Artical
Ari Juels, "Minimalist Cryptography for Low-Cost RFID Tags", RSA Laboratory, USA ,2008 View Artical
Canard, S., Coisel, I., Etrog, J., Girault, M., "Privacy-preserving RFID systems: Model and constructions", IACR Cryptology ePrint Archive ,Vol.13 ,2010 View Artical
Batina, L., Seys, S., Singel_ee, D., Verbauwhede, I., "Hierarchical eccbased RFID authentication protocol", In: In Proc. of CRYPTO?05, IACR ,2011 View Artical
Yi-Pin Liao, Chih-Ming Hsiao,, "secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol", Proc. of the 19th International Conference on Adva ,Vol.18 ,2014 View Artical
Yong Ki Lee, Lejla Batina, Ingrid Verbauwhede, "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol", IEEE International Conference on RFID ,2008 View Artical
A. Miyaji, M. S. Rahman, and M. Soshi., "Efficient and Low-Cost RFID Authentication Schemes", Journal of Wireless Mobile Networks Ubiquitous Com ,Vol.2 View Artical
Batina L, Lee Y, Seys S, et al, "Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs", Personal and Ubiquitous Computing View Artical
Peris-Lopez P, Orfila A, Hernandez-Castro J, et al, "Flaws on RFID grouping-proofs", Journal of Network and Computer Applications ,2011 View Artical
Ari Juels, "Minimalist Cryptography for Low-Cost RFID Tags", RSA Laboratory, USA ,2008 View Artical
Canard, S., Coisel, I., Etrog, J., Girault, M., "Privacy-preserving RFID systems: Model and constructions", IACR Cryptology ePrint Archive ,Vol.13 ,2010 View Artical
Yong Ki Lee, Lejla Batina, Ingrid Verbauwhede, "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol", IEEE International Conference on RFID ,2008 View Artical