|
[1]K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer,” Computational Intelligence and Security, Berlin, Guangzhou, pp. 1090 -1095, 2006. [2]S. Fouladgar, and H. Afifi, “An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags,” International Workshop on RFID Technology, Vienna, Austria, 2007. [3]B. Song, “RFID Tag Ownership Transfer,” Workshop on RFID Security and privacy, Budapest, 2008. [4]Y. Zuo, “Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags,” Hawaii International Conference on System Sciences, Koloa, Kauai, HI, pp. 1-10, 2010. [5]J. Saito, K. Imamoto, and K. Sakurai, “Reassignment Scheme of an RFID Tags Key for Owner Transfer,” Embedded and Ubiquitous Computing, Vol. 3823, pp. 1303-1312, 2005. [6]L. Kulseng, Z. Yu, Y. Wei and Y. Guan, “Lightweight Mutual Authentication and Ownership Transfer for RFID Systems,” IEEE INFOCOM, San Diego, CA, 2010. [7]H. Lei and T. Cao, “RFID Protocol Enabling Ownership Transfer to Protect against Traceability and DoS Attacks,” The First International Symposium on Data, Privacy, and E-Commerce, Chengdu, China, pp. 508-510, 2007. [8]G. Kapoor, and S. Piramuthu, “Single RFID Tag Ownership Transfer Protocols”, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2010. [9]C.L. Chen, Y.L. Lai, C.C. Chen, Y. Y. Deng, and Y. C. Hwang, “RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards,” International Journal of Network Security, Vol. 13, No. 1 pp. 41-48, 2011. [10]S. Fouladgar and H. Afifi, “A Simple Delegation Scheme for RFID Systems (SiDeS),” IEEE International Conference on RFID, Grapevine, Texas, USA, pp. 1-6, 2007. [11]E.J. Yoon, and K.Y. Yoo “Two Security Problems of RFID Security Method with Ownership Transfer,” Network and Parallel Computing, Shanghai, China, pp. 68-73, 2008. [12]B. Song and C. J. Mitchell. “RFID Authentication Protocol for Low-cost Tags,” ACM Conference on Wireless Network Security, Alexandria, Virginia, USA, 2008. [13]P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, T. Li, and Y. Li, “Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer,” Computer Networks : The International Journal of Computer and Telecommunications Networking, Vol. 54, No. 16, pp. 1502-1508, 2010. [14]H.Y. Chien, “SASI: A New Ultra-Lightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity,” IEEE Transactions on Dependable and Secure Computing, Vol. 4, No. 4, pp. 337 -340, 2007. [15]S.S. Kumar and C. Paar, “Are Standards Compliant Elliptic Curve Cryptosystems Feasible on RFID?” Workshop on RFID Security and privacy, Graz, Austria, 2006. [16]N.W. Lo and K.H. Yeh, “Mutual RFID Authentication Scheme for Resource-constrained Tags,” Journal of Information Science and Engineering, Vol. 26, No. 5, pp. 1875-1889, 2010. [17]H.Y. Chien, “Secure Access Control Schemes for RFID Systems with Anonymity,” International Workshop on Future Mobile and Ubiquitous Information Technologies, Nara, Japan, 2006. [18]L. Lu, J. Han, L. Hu, Y. Liu, and L. M. Ni, “Dynamic Key-updating: Privacy-preserving Authentication for RFID Systems,” IEEE International Conference on Pervasive Computing and Communications, New York, USA, pp. 13-22, 2007. [19]H.Y. Chien, and C.H. Chen, “Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards,” Computers Standards & Interfaces, Vol. 29, No. 2, pp. 254-259, 2007. [20]C.L. Chen, and Y.Y. Deng, “Conformation of EPC Class 1 Generation 2 Standards RFID System with Mutual Authentication and Privacy Protection,” Engineering Applications of Artificial Intelligence, Vol. 22, No. 8, pp. 1284-1291 2009. [21]P. Peris-Lopez, J.C. Hernandex-Castro, J.M. Estevex-Tapiador and A. Ribagorda, “LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags,” Workshop RFID Security, Graz, 2006. [22]P. Peris-Lopez, J.C. Hernandex-Castro, J.M. Estevex-Tapiador and A. Ribagorda, “EMAP: An Efficient Mutual Authentication Protocol for Low-cost Tags,” OTM Federated Conference and Workshop, Springer, Berlin, Germany, pp. 352-361, 2006. [23]P. Peris-Lopez, J.C. Hernandex-Castro, J.M. Estevex-Tapiador and A. Ribagorda, “M2AP: A Minimalist Mutual-authentication Protocol for Low-cost RFID Tags,” International Conference on Ubiquitous Intelligence and Computing, Wuhan and Three Gorges, China, Vol. 4159, pp. 912-923, 2006. [24]P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “Solving The Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags”, International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Istanbul, Turkey, 2007.
|