Abstract is missing.
- An Entity Relationship Extraction Model Based on Chameleon Clustering AlgorithmHuijuan Zhang, Shixuan Sun. 3-8 [doi]
- On Design of Secure APIs for IoT Applications - Using Taiwan Uniform e-Invoices as ExamplesShi-Cho Cha, Jyun-Fu Chen, Shih-Chieh Huang, Chih-Teng Tseng, Wei-Kai Chen. 9-20 [doi]
- Practical Relay Attack on Contactless Transactions by Using NFC Mobile PhonesLishoy Francis, Gerhard P. Hancke 0002, Keith Mayes, Konstantinos Markantonakis. 21-32 [doi]
- A RFID Path-Checking Protocol Based on Ordered MultisignaturesWei Xin, Huiping Sun, Zhao Wang, Zhi Guan, Zhong Chen 0001. 33-44 [doi]
- Design and Implementation of a Secure Prototype for EPCglobal Network ServicesJie Shi, Yingjiu Li, Robert H. Deng, Kevin Chiew. 45-56 [doi]
- Left-to-Right Recoded NAF* for RFID TagsWei-Hua He, Hung-An Chen. 57-62 [doi]
- A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling ApplicationWen-Tsai Ko, Erl-Huei Lu, Shin Yan Chiou, Henry Ker-Chang Chang. 63-71 [doi]
- Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 TagsKalikinkar Mandal, Xinxin Fan, Guang Gong. 73-84 [doi]
- Cryptanalyses of Two Ultralightweight RFID Authentication ProtocolsNai-Wei Lo, Kuo-Hui Yeh, Hsuan-Yu Chen. 85-93 [doi]