79 | -- | 86 | Xuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis. An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing |
87 | -- | 95 | George C. Dalton II, Kenneth S. Edge, Robert F. Mills, Richard A. Raines. Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees |
96 | -- | 105 | Manmeet Mahinderjit Singh, Xue Li. Trust in RFID-enabled Supply-Chain Management |
106 | -- | 118 | Michael Hutter, Thomas Plos, Martin Feldhofer. On the security of RFID devices against implementation attacks |
119 | -- | 127 | Yasuhiro Imasaki, Yongbing Zhang, Yusheng Ji. Secure and efficient data transmission in RFID sensor networks |
128 | -- | 134 | L. Sun. Security and privacy on low-cost Radio Frequency Identification systems |
135 | -- | 146 | Xiaowen Zhang, Qinghai Gao, Mohamed K. Saad. Looking at a class of RFID APs through GNY logic |
147 | -- | 155 | Susana Garrido Azevedo, Joao J. Ferreira. Radio frequency identification: a case study of healthcare organisations |
173 | -- | 187 | H. Guo, Y. Mu, X. Y. Zhang, Z. J. Li. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security |
188 | -- | 197 | Afolabi O. Richard, Aftab Ahmad, Kiseon Kim. Security assessments of IEEE 802.15.4 standard based on X.805 framework |
198 | -- | 205 | Yuhong Dong, Sam Hsu, Saeed Rajput, Bing Wu. Experimental analysis of application-level intrusion detection algorithms |