Shoehorning Security into the EPC Tag Standard, Proceedings of SCN, pp.303-320, 2006. ,
DOI : 10.1007/11832072_21
The Security of EPC Gen2 Compliant RFID Protocols, Proceedings of ACNS, pp.490-506, 2008. ,
DOI : 10.1007/978-3-540-68914-0_30
Secure EPC Gen2 Compliant Radio Frequency Identification, Proceedings of ADHOC-NOW, pp.227-240, 2009. ,
DOI : 10.1007/978-3-642-04383-3_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.3253
Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection, Engineering Applications of Artificial Intelligence, vol.22, issue.8, pp.1284-1291, 2009. ,
DOI : 10.1016/j.engappai.2008.10.022
Defending RFID authentication protocols against DoS attacks, Computer Communications, vol.34, issue.3, pp.384-390, 2011. ,
DOI : 10.1016/j.comcom.2010.06.014
Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard, Proceedings of WISTP, pp.254-263, 2011. ,
DOI : 10.1007/978-3-642-21040-2_18
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.4, pp.337-340, 2007. ,
DOI : 10.1109/TDSC.2007.70226
Secure access control schemes for RFID systems with anonymity, Proceedings of MDM, pp.96-116 ,
RFID specification revisited. In The internet of things:From RFID to The Next-Generation Pervasive Networked Systems, pp.311-346, 2008. ,
DOI : 10.1201/9781420052824.ch6
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, Proceedings of WiCom, pp.2078-2080, 2007. ,
DOI : 10.1007/978-3-540-39881-3_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.8095
Securing RFID systems conforming to EPC Class 1 Generation 2 standard, Expert Systems with Applications, vol.37, issue.12, pp.377678-7683, 2010. ,
DOI : 10.1016/j.eswa.2010.04.074