Abstract is missing.
- On RFID Authentication Protocols with Wide-Strong PrivacyNan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan. 3-16 [doi]
- Chameleon RFID and Tracking PreventionMarek Klonowski, Miroslaw Kutylowski, Piotr Syga. 17-29 [doi]
- A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled DelegationShu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo. 31-43 [doi]
- IBIHOP: Proper Privacy Preserving Mutual RFID AuthenticationRoel Peeters, Jens Hermans, Junfeng Fan. 45-56 [doi]
- A Framework to Securing RFID Transmissions by Varying Transmitted Reader's PowerFei Huo, Chouchang Yang, Guang Gong, Radha Poovendran. 57-68 [doi]
- SSL Usage in Commercial Internet of Things PlatformsRoy Fisher, Gerhard P. Hancke. 69-82 [doi]
- A Comparative Study of Stream Ciphers and Hash Functions for RFID AuthenticationsShugo Mikami, Dai Watanabe, Kazuo Sakiyama. 83-94 [doi]
- Securing NFC with Elliptic Curve Cryptography - Challenges and SolutionsXinxin Fan, Guang Gong. 97-106 [doi]
- Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable FunctionsRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 107-121 [doi]
- A Survey of Side Channel Attacks on MPKCs potential for RFIDWeijian Li, Shaohua Tang, Daojing He. 123-131 [doi]