1. Peris-Lopez P, Orfila A, Hernandez-Castro J, et al. Flaws on RFID grouping-proofs. Journal of Network and Computer Applications, 2011, 34(3): 833?845 2. Park C, Hur J, Hwang S, et al. Authenticated public key broadcast encryption scheme secure against insiders. Journal of Mathematical and Computer Modeling, 2012, 55(1/2): 113?122 3. Sadighian A, Jalili R. AFMAP: anonymous forward-secure mutual authentication protocols for RFID systems. Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE’09), Jun 18?23, 2009, Athens, Greece. Piscataway, NJ, USA: IEEE, 2009: 31?36 4. Batina L, Lee Y, Seys S, et al. Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Personal and Ubiquitous Computing, 2012, 16(3): 323?335 5. Wong C, Gouda M, Lam, S. Secure group communications using key graphs. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM’98), Sep 2?4, 1998, Vancouver, Canada. New York, NY, USA: ACM, 1998: 68?79 6. Ma C, Lin J, Wang Y, et al. Offline RFID grouping proofs with trusted timestamps. Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’12), Jun 25?27, 2012, Liverpool, UK. Los Alamitos, CA, USA: IEEE Computer Society, 2012: 674?681 7. Lin Q, Zhang F. ECC-based grouping-proof RFID for inpatient medication safety. Journal of Medical Systems, 2012, 36(6): 3527?3531 8. Dang D N, Kim K. On the security of RFID group scanning protocols. IEICE Transactions on Information and Communication Systems, 2010, 93D(3): 528?530 9. Leng X, Lien Y, Mayes K, et al. Select-response grouping proof for RFID tags. Proceedings of the 1st Asian Conference on Intelligent Information and Database Systems (ACIIDS’09), Apr 1?3, Dong Hoi, Vietnam. Piscataway, NJ, USA: IEEE, 2009: 73?77 10. Burmester M, Medeiros B, Motta R. Provably secure grouping-proofs for RFID tags. Proceeding of the 8th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS’08), Sep 8?11, 2008, London, UK. Berlin, Germany: Springer-Verlag, 2008: 176?190 11. Nair R, Perret E, Tedjini S. Chipless RFID based on group delay encoding. Proceedings of the 2011 IEEE International Conference on RFID- Technologies and Applications (RFID-TA’11), Sep 15?16 2011, Sitges, Spain. Piscataway, NJ, USA: IEEE, 2011: 214?218 12. Mandel C, Kubina B, Schussler M, et al. Group-delay modulation with metamaterial-inspired coding particles for passive chipless RFID. Proceedings of the 2012 IEEE International Conference on RFID- Technologies and Applications (RFID-TA), Nov 5?7, Nice, France. Piscataway, NJ, USA: IEEE, 2012: 5p 13. Sato Y, Mitsugi J, Nakamura O, et al. Theory and performance evaluation of group coding of RFID tags. IEEE Transactions on Automation Science and Engineering, 2012, 9(3): 458?466 14. Cucchiara R, Haider R, Mandreoli R, et al. Identification of intruders in groups of people using cameras and RFIDs. Proceedings of the 5th ACM/IEEE International Conference on Distributed SmartCameras (ICDSC’11), Aug 22?25, 2011, Ghent, Belgium. Piscataway, NJ, USA: IEEE, 2011: 6p 15. Yang M H. Secure multiple group ownership transfer protocol for mobile RFID. Electronic Commerce Research and Applications, 2012, 11(4): 361?373 16. Lee Y, Batina L, Singelee D, et al. Low-cost untraceable authentication protocols for RFID. Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec’10), Mar 22?24, Hoboken, NJ, USA. New York, NY, USA: ACM, 2010: 55?64 17. Yang M H, Hu H Y. Protocol for ownership transfer across authorities: with the ability to assign transfer target. Journal of Security and Communication Networks, 2012, 5(2): 164?177 |