Protocols for RFID tag/reader authentication
- 30 April 2007
- journal article
- Published by Elsevier in Decision Support Systems
- Vol. 43 (3), 897-914
- https://doi.org/10.1016/j.dss.2007.01.003
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Supply chain information sharing in a macro prediction marketDecision Support Systems, 2006
- Mobile decision support for in-store purchase decisionsDecision Support Systems, 2006
- The Evolution of RFID SecurityIEEE Pervasive Computing, 2006
- RFID Privacy: An Overview of Problems and Proposed SolutionsIEEE Security & Privacy, 2005
- Active attack against HB+: a provably secure lightweight authentication protocolElectronics Letters, 2005
- Noise-tolerant learning, the parity problem, and the statistical query modelJournal of the ACM, 2003
- Location-based authentication: Grounding cyberspace for better securityComputer Fraud & Security, 1996
- On the inherent intractability of certain coding problems (Corresp.)IEEE Transactions on Information Theory, 1978
- A Computing Procedure for Quantification TheoryJournal of the ACM, 1960