|
[1] A.Juels,” Strengthening epc tags against cloning.” Proceedings of the 4th ACM workshop on Wireless security, 2005, pp67-76 [2] Ahamed, S.I. Rahman, F. Hoque, E. Kawsar, F. Nakajima, T., “S3PR: Secure Serverless Search Protocols for RFID ” in Information Security and Assurance(ISA), 2008, pp.187-192. [3] Ahamed, S.I. Hoque, E. Rahman, F. Kawsar, F. Nakajima, T. “YA-SARP: Yet another Serverless Authentication RFID Protocol.” in Intelligent Environments, 2008, pp.1-8 [4] D.G. Han, T. Takagi, H. W. Kim, and K.I.Chung.” New security problem in RFID systems tag killing”. in Applied Cryptography and Information Security, 2006, pp375-384 [5] D.Molnar, D.Wanger. ” Privacy and Security in Library RFID: Issues, Practices, and Architectures” in 11th ACM Conference on Computer and Communications Security, 2004, pp.210-219 [6]Hong Lei, Tianjie Cao, ” RFID Protocol enabling Ownership Transfer to protect against Traceability and Dos attacks” in The First International Symposium on Data, Privacy, and E-Commerce (ISDPE), 2007, pp.508 - 510 [7] Hossain, M.S. Ahamed, S.I., “Towards a Simple Secured Searching Protocol for Future RFID Applications” in Future Trends of Distributed Computing Systems, 2008, pp.151-157 [8] Iuon-Chang Lin, Shih-Chang Tsaur and Kai-Ping Chang, ”Lightweight and serverless RFID Authentication and Search Protocol” in Computer and Electrical Engineering, 2009.pp. 95-99 [9]K. Osaka, T. Takagi, K. Yamasaki and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer”, in Computational Intelligence and Security, 2006, pp.1090-1093 [10] Kulseng, L. Zhen Yu Yawen Wei Yong Guan ,”Lightweight Secure Search Protocol for Low-cost RFID Systems” in IEEE International Conference on Distributed Computing Systems, 2009, pp.40-48 [11] M.Ohkubo, K. Suzuki, S.Kinoshita, “Cryptographic approach to” privacy-friendly” tags”, in RFID Privacy Workshop, 2003. pp. 21-30 [12] Min-Hua Shao, ” An Effective Privacy-Preserving RFID Scheme against Desynchronization”, in Intelligent Information Hiding and Multimedia Signal Processing, 2007, pp.659-662. [13] Sheikh Iqbal Ahamed, Farzana Rahman, Md. Endadul Hoque “ Secured Tag Indentification Using EDSA(Enhances Distributed Scalable Architecure)”in Symposium on Applied Computing Proceedings, 2008, pp1902-1907 [14] T. Dimitriou. ” A lightweight RFID protocol to protect against traceability and cloning attacks.” in Security and Privacy for Emerging Areas in Communications Networks,2005, pp.59-66 [15] Tae Youn Won, Ji Young Chun, Dong Hoon Lee, ”Strong Authentication Protocol for Secure RFID Tag Search Without Help of Central Database” in Embedded and Ubiquitous Computing, 2008.,pp. 153-158 [16] Tan, C.C. Bo Sheng Qun Li, “Secure and Serverless RFID Authentication and Search Protocols”, in IEEE Transactions on Wireless Communications, 2008, pp1400-1407. [17] Tsudik, G. “YA-TRAP : Yet another trivial RFID authentication protocol” in Pervasive Computing and Communications Workshops, 2006, pp.13-17. [18] A.Juels,” Privacy and Authentication in Low cost RFID Tags”, 2003 [19] J.Saito, J. C. Ryou and K. Sakurai, “Enhancing Privacy of Universal Re-encryption Schema for RFID Tags”, Embedded and Ubiquitous Computing-EUC 2004, LNCS3207, Aizu-wakatsuma City, Japan , Aug.2004 [20] D.N.Duc, J.Park, H.Lee and K.Kim, “Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning” The 2006 Symposium on Cryptography and Information Security,2006. [21] Stephen A.Weis, Sanjay E “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems” First International Conference on Security in Pervasive Computing, 2006 [22] Sanjay E Sarma, Stephen A.Weis, and Daniel W.Engels ”RFID Systems and Security and Privacy Implications” in Workshop on Cryptographic Hardware AND Embedded Systems, Lecture Notes in Computer Science,2002
|