Tao, Feng; Wang, Liang; Fan, Tijun; Yu, Hao RFID adoption strategy in a retailer-dominant supply chain with competing suppliers. (English) Zbl 07530092 Eur. J. Oper. Res. 302, No. 1, 117-129 (2022). MSC: 90Bxx PDF BibTeX XML Cite \textit{F. Tao} et al., Eur. J. Oper. Res. 302, No. 1, 117--129 (2022; Zbl 07530092) Full Text: DOI OpenURL
Zheng, Qi; Hu, Bin; Fan, Tijun; Xu, Chang; Li, Xiaolong Impact of RFID technology on coordination of a three-tier fresh product supply chain. (English) Zbl 07505865 Asia-Pac. J. Oper. Res. 39, No. 1, Article ID 2140033, 30 p. (2022). MSC: 90B05 90B06 PDF BibTeX XML Cite \textit{Q. Zheng} et al., Asia-Pac. J. Oper. Res. 39, No. 1, Article ID 2140033, 30 p. (2022; Zbl 07505865) Full Text: DOI OpenURL
Hauser, Matthias; Flath, Christoph M.; Thiesse, Frédéric Catch me if you scan: data-driven prescriptive modeling for smart store environments. (English) Zbl 07421415 Eur. J. Oper. Res. 294, No. 3, 860-873 (2021). MSC: 90Bxx PDF BibTeX XML Cite \textit{M. Hauser} et al., Eur. J. Oper. Res. 294, No. 3, 860--873 (2021; Zbl 07421415) Full Text: DOI OpenURL
Fan, Kai; Luo, Qi; Zhang, Kuan; Yang, Yintang Cloud-based lightweight secure RFID mutual authentication protocol in IoT. (English) Zbl 1458.68057 Inf. Sci. 527, 329-340 (2020). MSC: 68P27 68M11 94A62 PDF BibTeX XML Cite \textit{K. Fan} et al., Inf. Sci. 527, 329--340 (2020; Zbl 1458.68057) Full Text: DOI OpenURL
Yan, Bo; Chen, Xiaoxu; Yuan, Qin; Zhou, Xiaotai Sustainability in fresh agricultural product supply chain based on radio frequency identification under an emergency. (English) Zbl 07311716 CEJOR, Cent. Eur. J. Oper. Res. 28, No. 4, 1343-1361 (2020). MSC: 90Bxx PDF BibTeX XML Cite \textit{B. Yan} et al., CEJOR, Cent. Eur. J. Oper. Res. 28, No. 4, 1343--1361 (2020; Zbl 07311716) Full Text: DOI OpenURL
Yang, Huixiao; Chen, Wenbo Game modes and investment cost locations in radio-frequency identification (RFID) adoption. (English) Zbl 1443.90108 Eur. J. Oper. Res. 286, No. 3, 883-896 (2020). MSC: 90B05 91A80 91B26 PDF BibTeX XML Cite \textit{H. Yang} and \textit{W. Chen}, Eur. J. Oper. Res. 286, No. 3, 883--896 (2020; Zbl 1443.90108) Full Text: DOI OpenURL
Guo, Jianhua; Liu, Yu; Li, Xiugang; Huang, Wei; Cao, Jinde; Wei, Yun Enhanced least square based dynamic OD matrix estimation using radio frequency identification data. (English) Zbl 07316540 Math. Comput. Simul. 155, 27-40 (2019). MSC: 90Cxx 90Bxx PDF BibTeX XML Cite \textit{J. Guo} et al., Math. Comput. Simul. 155, 27--40 (2019; Zbl 07316540) Full Text: DOI OpenURL
Hajipour, Vahid; Tavana, Madjid; Di Caprio, Debora; Akhgar, Majid; Jabbari, Yasaman An optimization model for traceable closed-loop supply chain networks. (English) Zbl 1481.90057 Appl. Math. Modelling 71, 673-699 (2019). MSC: 90B06 90C11 90C90 PDF BibTeX XML Cite \textit{V. Hajipour} et al., Appl. Math. Modelling 71, 673--699 (2019; Zbl 1481.90057) Full Text: DOI OpenURL
Tsao, Yu-Chung A continuous approximation approach for supply network design considering radio frequency identification adoption. (English) Zbl 1430.90036 RAIRO, Oper. Res. 53, No. 5, 1843-1860 (2019). MSC: 90B05 90B06 PDF BibTeX XML Cite \textit{Y.-C. Tsao}, RAIRO, Oper. Res. 53, No. 5, 1843--1860 (2019; Zbl 1430.90036) Full Text: DOI OpenURL
Wang, Fafa; Su, Tingli; Jin, Xuebo; Zheng, Yangyang; Kong, Jianlei; Bai, Yuting Indoor tracking by RFID fusion with IMU data. (English) Zbl 1454.70010 Asian J. Control 21, No. 4, 1768-1777 (2019). MSC: 70Q05 PDF BibTeX XML Cite \textit{F. Wang} et al., Asian J. Control 21, No. 4, 1768--1777 (2019; Zbl 1454.70010) Full Text: DOI OpenURL
Xu, Jie; Dang, Lanjun An efficient RFID anonymous batch authentication protocol based on group signature. (English) Zbl 1419.94059 Discrete Contin. Dyn. Syst., Ser. S 12, No. 4-5, 1489-1500 (2019). MSC: 94A62 PDF BibTeX XML Cite \textit{J. Xu} and \textit{L. Dang}, Discrete Contin. Dyn. Syst., Ser. S 12, No. 4--5, 1489--1500 (2019; Zbl 1419.94059) Full Text: DOI OpenURL
Huang, Jiapeng; Wen, Zhenzao; Kong, Linghe; Ge, Li; Wu, Min-You; Chen, Guihai Accelerate the classification statistics in RFID systems. (English) Zbl 1455.94211 Theor. Comput. Sci. 788, 39-52 (2019). MSC: 94A62 62H30 PDF BibTeX XML Cite \textit{J. Huang} et al., Theor. Comput. Sci. 788, 39--52 (2019; Zbl 1455.94211) Full Text: DOI OpenURL
Zhu, Dali; Rong, Wenjing; Wu, Di; Pang, Na Multi-attribute counterfeiting tag identification protocol in large-scale RFID system. (English) Zbl 1452.94100 Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 352-362 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Zhu} et al., Lect. Notes Comput. Sci. 10631, 352--362 (2018; Zbl 1452.94100) Full Text: DOI OpenURL
Li, Jun; Wei, Lingyan Optimization of warehouse picking route based on deviation ratio. (Chinese. English summary) Zbl 1424.90024 Math. Pract. Theory 48, No. 14, 183-191 (2018). MSC: 90B06 90C27 PDF BibTeX XML Cite \textit{J. Li} and \textit{L. Wei}, Math. Pract. Theory 48, No. 14, 183--191 (2018; Zbl 1424.90024) OpenURL
Hu, Yi; Wang, Linna The realization of radio frequency identification handset antenna based on Internet of Things. (English) Zbl 1397.78042 Ital. J. Pure Appl. Math. 39, 424-433 (2018). MSC: 78A50 94A05 PDF BibTeX XML Cite \textit{Y. Hu} and \textit{L. Wang}, Ital. J. Pure Appl. Math. 39, 424--433 (2018; Zbl 1397.78042) Full Text: Link OpenURL
Kılınç, Handan; Vaudenay, Serge Formal analysis of distance bounding with secure hardware. (English) Zbl 1440.94097 Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 579-597 (2018). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{H. Kılınç} and \textit{S. Vaudenay}, Lect. Notes Comput. Sci. 10892, 579--597 (2018; Zbl 1440.94097) Full Text: DOI Link OpenURL
Zhang, Li-Hao; Li, Tian; Fan, Ti-Jun Radio-frequency identification (RFID) adoption with inventory misplacement under retail competition. (English) Zbl 1403.90067 Eur. J. Oper. Res. 270, No. 3, 1028-1043 (2018). MSC: 90B05 90B06 91A80 PDF BibTeX XML Cite \textit{L.-H. Zhang} et al., Eur. J. Oper. Res. 270, No. 3, 1028--1043 (2018; Zbl 1403.90067) Full Text: DOI OpenURL
Assidi, Hafsa; Ayebie, Edoukou Berenger; Souidi, El Mamoun Two mutual authentication protocols based on zero-knowledge proofs for RFID systems. (English) Zbl 06889992 Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 267-283 (2018). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{H. Assidi} et al., Lect. Notes Comput. Sci. 10779, 267--283 (2018; Zbl 06889992) Full Text: DOI OpenURL
Wang, WenJie; Xu, Qi; Fan, Dandan Stein-rule combination forecasting on RFID based supply chain. (English) Zbl 1394.90136 Asia-Pac. J. Oper. Res. 35, No. 2, Article ID 1840001, 13 p. (2018). MSC: 90B06 90B05 PDF BibTeX XML Cite \textit{W. Wang} et al., Asia-Pac. J. Oper. Res. 35, No. 2, Article ID 1840001, 13 p. (2018; Zbl 1394.90136) Full Text: DOI OpenURL
Tsao, Yu-Chung; Zhang, Qinhong; Chang, Fu-Chi; Vu-Thuy, Linh An imperfect production model under radio frequency identification adoption and trade credit. (English) Zbl 1443.90073 Appl. Math. Modelling 42, 493-508 (2017). MSC: 90-10 90B05 90B30 PDF BibTeX XML Cite \textit{Y.-C. Tsao} et al., Appl. Math. Modelling 42, 493--508 (2017; Zbl 1443.90073) Full Text: DOI OpenURL
Wen, Zhenzao; Huang, Jiapeng; Kong, Linghe; Wu, Min-You; Chen, Guihai Classification statistics in RFID systems. (English) Zbl 1474.62252 Gao, Xiaofeng (ed.) et al., Combinatorial optimization and applications. 11th international conference, COCOA 2017, Shanghai, China, December 16–18, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10628, 425-440 (2017). MSC: 62H30 68T10 PDF BibTeX XML Cite \textit{Z. Wen} et al., Lect. Notes Comput. Sci. 10628, 425--440 (2017; Zbl 1474.62252) Full Text: DOI OpenURL
Gao, Ying Particle swarm optimizer with cloud generators for optimizing RFID network. (English) Zbl 1389.90351 J. Guangzhou Univ., Nat. Sci. 16, No. 2, 82-88 (2017). MSC: 90C59 68T20 PDF BibTeX XML Cite \textit{Y. Gao}, J. Guangzhou Univ., Nat. Sci. 16, No. 2, 82--88 (2017; Zbl 1389.90351) OpenURL
Hervert-Escobar, Laura; Smith, Neale R.; Matis, Timothy I.; Vargas-Rosales, Cesar Optimal location of RFID reader antennas in a three dimensional space. (English) Zbl 1381.90052 Ann. Oper. Res. 258, No. 2, 815-823 (2017). MSC: 90B80 PDF BibTeX XML Cite \textit{L. Hervert-Escobar} et al., Ann. Oper. Res. 258, No. 2, 815--823 (2017; Zbl 1381.90052) Full Text: DOI OpenURL
Zhou, Wei; Piramuthu, Selwyn Identification shrinkage in inventory management: an RFID-based solution. (English) Zbl 1381.90016 Ann. Oper. Res. 258, No. 2, 285-300 (2017). MSC: 90B05 PDF BibTeX XML Cite \textit{W. Zhou} and \textit{S. Piramuthu}, Ann. Oper. Res. 258, No. 2, 285--300 (2017; Zbl 1381.90016) Full Text: DOI OpenURL
Vishnevskiy, Vladimir M. (ed.); Samouylov, Konstantin E. (ed.); Kozyrev, Dmitry V. (ed.) Distributed computer and communication networks. 20th international conference, DCCN 2017, Moscow, Russia, September 25–29, 2017. Proceedings. (English) Zbl 1393.68018 Communications in Computer and Information Science 700. Cham: Springer (ISBN 978-3-319-66835-2/pbk; 978-3-319-66836-9/ebook). xiv, 478 p. (2017). MSC: 68-06 68M10 68M14 68M20 90B18 00B25 PDF BibTeX XML Cite \textit{V. M. Vishnevskiy} (ed.) et al., Distributed computer and communication networks. 20th international conference, DCCN 2017, Moscow, Russia, September 25--29, 2017. Proceedings. Cham: Springer (2017; Zbl 1393.68018) Full Text: DOI OpenURL
Laing, Thalia M.; Martin, Keith M.; Paterson, Maura B.; Stinson, Douglas R. Localised multisecret sharing. (English) Zbl 1409.94916 Cryptogr. Commun. 9, No. 5, 581-597 (2017). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{T. M. Laing} et al., Cryptogr. Commun. 9, No. 5, 581--597 (2017; Zbl 1409.94916) Full Text: DOI Link OpenURL
Wang, Hongbing; Li, Yingjiu; Zhang, Zongyang; Zhao, Yunlei Efficient tag path authentication protocol with less tag memory. (English) Zbl 1403.94100 Bao, Feng (ed.) et al., Information security practice and experience. 12th international conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-49150-9/pbk; 978-3-319-49151-6/ebook). Lecture Notes in Computer Science 10060, 255-270 (2016). MSC: 94A62 PDF BibTeX XML Cite \textit{H. Wang} et al., Lect. Notes Comput. Sci. 10060, 255--270 (2016; Zbl 1403.94100) Full Text: DOI Link OpenURL
Mizuno, Koya; Takahashi, Yutaka Performance analysis of tag identification time in passive RFID systems. (English) Zbl 1409.90035 Proceedings of the 11th international conference on queueing theory and network applications, QTNA 2016, Wellington, New Zealand, December 13–15, 2016. New York, NY: Association for Computing Machinery (ACM). Paper No. 25, 4 p. (2016). MSC: 90B06 65K05 PDF BibTeX XML Cite \textit{K. Mizuno} and \textit{Y. Takahashi}, in: Proceedings of the 11th international conference on queueing theory and network applications, QTNA 2016, Wellington, New Zealand, December 13--15, 2016. New York, NY: Association for Computing Machinery (ACM). Paper No. 25, 4 p. (2016; Zbl 1409.90035) Full Text: DOI OpenURL
Jannati, Hoda; Ardeshir-Larijani, Ebrahim Detecting relay attacks on RFID communication systems using quantum bits. (English) Zbl 1357.81045 Quantum Inf. Process. 15, No. 11, 4759-4771 (2016). MSC: 81P45 81P94 94A60 81P68 PDF BibTeX XML Cite \textit{H. Jannati} and \textit{E. Ardeshir-Larijani}, Quantum Inf. Process. 15, No. 11, 4759--4771 (2016; Zbl 1357.81045) Full Text: DOI OpenURL
Cinicioglu, Esma Nur; Shenoy, Prakash P. A new heuristic for learning Bayesian networks from limited datasets: a real-time recommendation system application with RFID systems in grocery stores. (English) Zbl 1357.90024 Ann. Oper. Res. 244, No. 2, 385-405 (2016). MSC: 90B15 90C59 PDF BibTeX XML Cite \textit{E. N. Cinicioglu} and \textit{P. P. Shenoy}, Ann. Oper. Res. 244, No. 2, 385--405 (2016; Zbl 1357.90024) Full Text: DOI Link OpenURL
Kılınç, Handan; Vaudenay, Serge Efficient public-key distance bounding protocol. (English) Zbl 1407.94129 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 873-901 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Kılınç} and \textit{S. Vaudenay}, Lect. Notes Comput. Sci. 10032, 873--901 (2016; Zbl 1407.94129) Full Text: DOI OpenURL
Yang, Gangqiang; Zhu, Bo; Suder, Valentin; Aagaard, Mark D.; Gong, Guang The Simeck family of lightweight block ciphers. (English) Zbl 1380.94132 Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 307-329 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Yang} et al., Lect. Notes Comput. Sci. 9293, 307--329 (2015; Zbl 1380.94132) Full Text: DOI OpenURL
Cho, Jung-Sik; Jeong, Young-Sik; Park, Sang Oh Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol. (English) Zbl 1359.94640 Comput. Math. Appl. 69, No. 1, 58-65 (2015). MSC: 94A62 PDF BibTeX XML Cite \textit{J.-S. Cho} et al., Comput. Math. Appl. 69, No. 1, 58--65 (2015; Zbl 1359.94640) Full Text: DOI OpenURL
Ma, Lianbo; Hu, Kunyuan; Zhu, Yunlong; Chen, Hanning A hybrid artificial bee colony optimizer by combining with life-cycle, Powell’s search and crossover. (English) Zbl 1338.90473 Appl. Math. Comput. 252, 133-154 (2015). MSC: 90C59 PDF BibTeX XML Cite \textit{L. Ma} et al., Appl. Math. Comput. 252, 133--154 (2015; Zbl 1338.90473) Full Text: DOI OpenURL
Edelev, Sviatoslav Towards a lightweight, secure, and untraceable RFID authentication protocol. (English) Zbl 1333.94003 Göttingen: Univ. Göttingen (Diss.). vii, 92 p. (2015). MSC: 94-02 94A60 94A62 PDF BibTeX XML Cite \textit{S. Edelev}, Towards a lightweight, secure, and untraceable RFID authentication protocol. Göttingen: Univ. Göttingen (Diss.) (2015; Zbl 1333.94003) Full Text: Link Link OpenURL
Chikouche, Noureddine; Cherif, Foudil; Cayrel, Pierre-Louis; Benmohammed, Mohamed Weaknesses in two RFID authentication protocols. (English) Zbl 1441.94097 El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 162-172 (2015). MSC: 94A62 PDF BibTeX XML Cite \textit{N. Chikouche} et al., Lect. Notes Comput. Sci. 9084, 162--172 (2015; Zbl 1441.94097) Full Text: DOI OpenURL
Moriyama, Daisuke A provably secure offline RFID yoking-proof protocol with anonymity. (English) Zbl 1382.94144 Eisenbarth, Thomas (ed.) et al., Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). Lecture Notes in Computer Science 8898, 155-167 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{D. Moriyama}, Lect. Notes Comput. Sci. 8898, 155--167 (2015; Zbl 1382.94144) Full Text: DOI OpenURL
Ruzsa, Zoltán; Parisek, Zsolt; Király, Roland; Tómács, Tibor; Szakács, Tamás; Hajagos, Henrik Building of a mathematics-based RFID localization framework. (English) Zbl 1340.90043 Ann. Math. Inform. 44, 165-176 (2015). MSC: 90B18 90B85 PDF BibTeX XML Cite \textit{Z. Ruzsa} et al., Ann. Math. Inform. 44, 165--176 (2015; Zbl 1340.90043) OpenURL
Radványi, Tibor; Biró, Csaba; Király, Sándor; Szigetváry, Péter; Takács, Péter Survey of attacking and defending in the RFID system. (English) Zbl 1340.94067 Ann. Math. Inform. 44, 151-164 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Radványi} et al., Ann. Math. Inform. 44, 151--164 (2015; Zbl 1340.94067) OpenURL
Chang, Shan; Lu, Li; Liu, Xiaoqiang; Song, Hui; Yao, Qingsong Vulnerability aware graphs for RFID protocol security benchmarking. (English) Zbl 1328.68023 J. Comput. Syst. Sci. 81, No. 6, 1027-1041 (2015). MSC: 68M12 94A60 94A62 PDF BibTeX XML Cite \textit{S. Chang} et al., J. Comput. Syst. Sci. 81, No. 6, 1027--1041 (2015; Zbl 1328.68023) Full Text: DOI OpenURL
Biró, Csaba; Kusper, Gábor; Radványi, Tibor; Király, Sándor; Szigetváry, Péter; Takács, Péter SAT representation of randomly deployed wireless sensor networks. (English) Zbl 1372.68204 Kovács, Emőd (ed.) et al., Proceedings of the 9th international conference on applied informatics (ICAI 2014), Eger, Hungary, January 29 – February 1, 2014. Volume 2. Eger: Eszterhazy Karoly University of Applied Sciences (ISBN 978-615-5297-19-9). 101-111 (2014). MSC: 68R10 68M10 68M15 PDF BibTeX XML Cite \textit{C. Biró} et al., in: Proceedings of the 9th international conference on applied informatics (ICAI 2014), Eger, Hungary, January 29 -- February 1, 2014. Volume 2. Eger: Eszterhazy Karoly University of Applied Sciences. 101--111 (2014; Zbl 1372.68204) Full Text: DOI OpenURL
Piramuthu, Selwyn; Wochner, Sina; Grunow, Martin Should retail stores also RFID-tag ‘cheap’ items? (English) Zbl 1339.90220 Eur. J. Oper. Res. 233, No. 1, 281-291 (2014). MSC: 90B90 90B05 90B50 PDF BibTeX XML Cite \textit{S. Piramuthu} et al., Eur. J. Oper. Res. 233, No. 1, 281--291 (2014; Zbl 1339.90220) Full Text: DOI OpenURL
Chiu, Yi-Hao; Hong, Wei-Chih; Chou, Li-Ping; Ding, Jintai; Yang, Bo-Yin; Cheng, Chen-Mou A practical attack on patched MIFARE Classic. (English) Zbl 1347.94028 Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 150-164 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{Y.-H. Chiu} et al., Lect. Notes Comput. Sci. 8567, 150--164 (2014; Zbl 1347.94028) Full Text: DOI OpenURL
Chen, Jiageng; Miyaji, Atsuko; Su, Chunhua A provable secure batch authentication scheme for EPCGen2 tags. (English) Zbl 1368.94143 Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 103-116 (2014). MSC: 94A62 PDF BibTeX XML Cite \textit{J. Chen} et al., Lect. Notes Comput. Sci. 8782, 103--116 (2014; Zbl 1368.94143) Full Text: DOI OpenURL
Safkhani, Masoumeh; Peris-Lopez, Pedro; Hernandez-Castro, Julio Cesar; Bagheri, Nasour Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol. (English) Zbl 1339.94080 J. Comput. Appl. Math. 259, Part B, 571-577 (2014). MSC: 94A62 PDF BibTeX XML Cite \textit{M. Safkhani} et al., J. Comput. Appl. Math. 259, Part B, 571--577 (2014; Zbl 1339.94080) Full Text: DOI OpenURL
Safkhani, Masoumeh; Bagheri, Nasour; Mahani, Ali On the security of RFID anti-counting security protocol (ACSP). (English) Zbl 1354.94058 J. Comput. Appl. Math. 259, Part B, 512-521 (2014). MSC: 94A62 68P30 PDF BibTeX XML Cite \textit{M. Safkhani} et al., J. Comput. Appl. Math. 259, Part B, 512--521 (2014; Zbl 1354.94058) Full Text: DOI OpenURL
Bay, Aslı; Huang, Jialin; Vaudenay, Serge Improved linear cryptanalysis of reduced-round MIBS. (English) Zbl 1417.94041 Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 204-220 (2014). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Bay} et al., Lect. Notes Comput. Sci. 8639, 204--220 (2014; Zbl 1417.94041) Full Text: DOI Link OpenURL
Endo, Kosei; Kunihiro, Noboru On the security proof of an authentication protocol from Eurocrypt 2011. (English) Zbl 1417.94094 Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 187-203 (2014). MSC: 94A62 68M12 PDF BibTeX XML Cite \textit{K. Endo} and \textit{N. Kunihiro}, Lect. Notes Comput. Sci. 8639, 187--203 (2014; Zbl 1417.94094) Full Text: DOI OpenURL
Ondemir, Onder; Gupta, Surendra M. A multi-criteria decision making model for advanced repair-to-order and disassembly-to-order system. (English) Zbl 1305.90234 Eur. J. Oper. Res. 233, No. 2, 408-419 (2014). MSC: 90B50 90B25 PDF BibTeX XML Cite \textit{O. Ondemir} and \textit{S. M. Gupta}, Eur. J. Oper. Res. 233, No. 2, 408--419 (2014; Zbl 1305.90234) Full Text: DOI OpenURL
Kök, A. Gürhan; Shang, Kevin H. Evaluation of cycle-count policies for supply chains with inventory inaccuracy and implications on RFID investments. (English) Zbl 1304.90014 Eur. J. Oper. Res. 237, No. 1, 91-105 (2014). MSC: 90B05 90B06 PDF BibTeX XML Cite \textit{A. G. Kök} and \textit{K. H. Shang}, Eur. J. Oper. Res. 237, No. 1, 91--105 (2014; Zbl 1304.90014) Full Text: DOI OpenURL
Semenova, Olga; Lykov, Stanislav Application of RFID-technology to the problem of traffic control through roadway intersections. (English) Zbl 1298.90024 Vishnevsky, Vladimir (ed.) et al., Distributed computer and communication networks. 17th international conference, DCCN 2013, Moscow, Russia, October 7–10, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-05208-3/pbk; 978-3-319-05209-0/ebook). Communications in Computer and Information Science 279, 256-266 (2014). MSC: 90B20 PDF BibTeX XML Cite \textit{O. Semenova} and \textit{S. Lykov}, Commun. Comput. Inf. Sci. 279, 256--266 (2014; Zbl 1298.90024) OpenURL
Vishnevsky, Vladimir; Kozyrev, Dmitry; Rykov, Vladimir New generation of safety systems for automobile traffic control using RFID technology and broadband wireless communication. (English) Zbl 1298.90012 Vishnevsky, Vladimir (ed.) et al., Distributed computer and communication networks. 17th international conference, DCCN 2013, Moscow, Russia, October 7–10, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-05208-3/pbk; 978-3-319-05209-0/ebook). Communications in Computer and Information Science 279, 145-153 (2014). MSC: 90B15 90B20 68M10 68M20 PDF BibTeX XML Cite \textit{V. Vishnevsky} et al., Commun. Comput. Inf. Sci. 279, 145--153 (2014; Zbl 1298.90012) OpenURL
Zhou, Wei; Piramuthu, Selwyn Consumer preference and service quality management with RFID. (English) Zbl 1296.90032 Ann. Oper. Res. 216, 35-51 (2014). MSC: 90B22 91B08 PDF BibTeX XML Cite \textit{W. Zhou} and \textit{S. Piramuthu}, Ann. Oper. Res. 216, 35--51 (2014; Zbl 1296.90032) Full Text: DOI OpenURL
Chang, Tsung-Han; Hsu, Shu-Chen; Wang, Tien-Chin A proposed model for measuring the aggregative risk degree of implementing an RFID digital campus system with the consistent fuzzy preference relations. (English) Zbl 1351.91014 Appl. Math. Modelling 37, No. 5, 2605-2622 (2013). MSC: 91B08 PDF BibTeX XML Cite \textit{T.-H. Chang} et al., Appl. Math. Modelling 37, No. 5, 2605--2622 (2013; Zbl 1351.91014) Full Text: DOI OpenURL
Metzger, Christian; Thiesse, Frédéric; Gershwin, Stanley; Fleisch, Elgar The impact of false-negative reads on the performance of RFID-based shelf inventory control policies. (English) Zbl 1348.90034 Comput. Oper. Res. 40, No. 7, 1864-1873 (2013). MSC: 90B05 90B30 PDF BibTeX XML Cite \textit{C. Metzger} et al., Comput. Oper. Res. 40, No. 7, 1864--1873 (2013; Zbl 1348.90034) Full Text: DOI Link OpenURL
Das, Manik Lal Strong security and privacy of RFID system for internet of things infrastructure. (English) Zbl 1355.68023 Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 56-69 (2013). MSC: 68M11 68M12 94A60 94A62 PDF BibTeX XML Cite \textit{M. L. Das}, Lect. Notes Comput. Sci. 8204, 56--69 (2013; Zbl 1355.68023) Full Text: DOI OpenURL
Tan, Aik Theng; Zainol, Zurinahni; Budiarto, Rahmat Flowgraph models for estimating total time of authentication process in RFID system. (English) Zbl 1293.94106 J. Franklin Inst. 350, No. 5, 1298-1311 (2013). MSC: 94A62 93C95 PDF BibTeX XML Cite \textit{A. T. Tan} et al., J. Franklin Inst. 350, No. 5, 1298--1311 (2013; Zbl 1293.94106) Full Text: DOI OpenURL
Suei, Pei-Lun; Lee, Victor C. S.; Lo, Shi-Wu; Kuo, Tei-Wei An efficient B\(^{+}\)-tree design for main-memory database systems with strong access locality. (English) Zbl 1293.68089 Inf. Sci. 232, 325-345 (2013). MSC: 68P05 68P15 PDF BibTeX XML Cite \textit{P.-L. Suei} et al., Inf. Sci. 232, 325--345 (2013; Zbl 1293.68089) Full Text: DOI OpenURL
Chongwatpol, Jongsawas; Sharda, Ramesh RFID-enabled track and traceability in job-shop scheduling environment. (English) Zbl 1292.90110 Eur. J. Oper. Res. 227, No. 3, 453-463 (2013). MSC: 90B35 PDF BibTeX XML Cite \textit{J. Chongwatpol} and \textit{R. Sharda}, Eur. J. Oper. Res. 227, No. 3, 453--463 (2013; Zbl 1292.90110) Full Text: DOI OpenURL
Piramuthu, Selwyn; Farahani, Poorya; Grunow, Martin RFID-generated traceability for contaminated product recall in perishable food supply networks. (English) Zbl 1292.90062 Eur. J. Oper. Res. 225, No. 2, 253-262 (2013). MSC: 90B06 PDF BibTeX XML Cite \textit{S. Piramuthu} et al., Eur. J. Oper. Res. 225, No. 2, 253--262 (2013; Zbl 1292.90062) Full Text: DOI OpenURL
Bernstein, Daniel J.; Lange, Tanja Never trust a bunny. (English) Zbl 1337.94093 Hoepman, Jaap-Henk (ed.) et al., Radio frequency identification. Security and privacy issues. 8th international workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2–3, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36139-5/pbk). Lecture Notes in Computer Science 7739, 137-148 (2013). MSC: 94A62 PDF BibTeX XML Cite \textit{D. J. Bernstein} and \textit{T. Lange}, Lect. Notes Comput. Sci. 7739, 137--148 (2013; Zbl 1337.94093) Full Text: DOI OpenURL
Pessl, Peter; Hutter, Michael Pushing the limits of SHA-3 hardware implementations to fit on RFID. (English) Zbl 1353.94068 Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 126-141 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Pessl} and \textit{M. Hutter}, Lect. Notes Comput. Sci. 8086, 126--141 (2013; Zbl 1353.94068) Full Text: DOI Link OpenURL
Kardaş, Süleyman; Çelik, Serkan; Arslan, Atakan; Levi, Albert An efficient and private RFID authentication protocol supporting ownership transfer. (English) Zbl 1412.94183 Avoine, Gildas (ed.) et al., Lightweight cryptography for security and privacy. Second international workshop, LightSec 2013, Gebze, Turkey, May 6–7, 2013. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8162, 130-141 (2013). MSC: 94A60 68M12 68P25 PDF BibTeX XML Cite \textit{S. Kardaş} et al., Lect. Notes Comput. Sci. 8162, 130--141 (2013; Zbl 1412.94183) Full Text: DOI OpenURL
Chang, Ya-Fen; Tai, Wei-Liang; Chen, Chia-Chen Authentication protocols for reliable information provision systems with low computational-ability devices. (English) Zbl 1267.68028 Informatica, Vilnius 24, No. 1, 1-12 (2013). MSC: 68M10 94A62 68P25 PDF BibTeX XML Cite \textit{Y.-F. Chang} et al., Informatica, Vilnius 24, No. 1, 1--12 (2013; Zbl 1267.68028) OpenURL
Ahmadian, Zahra; Salmasizadeh, Mahmoud; Aref, Mohammad Reza Desynchronization attack on RAPP ultralightweight authentication protocol. (English) Zbl 1259.94062 Inf. Process. Lett. 113, No. 7, 205-209 (2013). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{Z. Ahmadian} et al., Inf. Process. Lett. 113, No. 7, 205--209 (2013; Zbl 1259.94062) Full Text: DOI Link OpenURL
Golić, Jovan Dj. Cryptanalytic attacks on MIFARE classic protocol. (English) Zbl 1312.94051 Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 239-258 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Dj. Golić}, Lect. Notes Comput. Sci. 7779, 239--258 (2013; Zbl 1312.94051) Full Text: DOI OpenURL
Korak, Thomas; Plos, Thomas Applying remote side-channel analysis attacks on a security-enabled NFC tag. (English) Zbl 1312.94065 Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 207-222 (2013). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Korak} and \textit{T. Plos}, Lect. Notes Comput. Sci. 7779, 207--222 (2013; Zbl 1312.94065) Full Text: DOI OpenURL
Chew, Ek Peng; Lee, Loo Hay; Sim, Chee-Khian The impact of supply chain visibility when lead time is random. (English) Zbl 1260.90012 OR Spectrum 35, No. 1, 163-190 (2013). MSC: 90B05 90B30 PDF BibTeX XML Cite \textit{E. P. Chew} et al., OR Spectrum 35, No. 1, 163--190 (2013; Zbl 1260.90012) Full Text: DOI OpenURL
Tong, Qiaoling; Zhang, Qiao; Min, Run; Zou, Xuecheng Bayesian estimation in dynamic framed slotted ALOHA algorithm for RFID system. (English) Zbl 1356.94042 Comput. Math. Appl. 64, No. 5, 1179-1186 (2012). MSC: 94A13 62F15 PDF BibTeX XML Cite \textit{Q. Tong} et al., Comput. Math. Appl. 64, No. 5, 1179--1186 (2012; Zbl 1356.94042) Full Text: DOI OpenURL
Plos, Thomas; Dobraunig, Christoph; Hofinger, Markus; Oprisnik, Alexander; Wiesmeier, Christoph; Wiesmeier, Johannes Compact hardware implementations of the block ciphers mCRYPTON, NOEKEON, and SEA. (English) Zbl 1295.94132 Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 358-377 (2012). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{T. Plos} et al., Lect. Notes Comput. Sci. 7668, 358--377 (2012; Zbl 1295.94132) Full Text: DOI OpenURL
Moriyama, Daisuke; Matsuo, Shin’ichiro; Ohkubo, Miyako Relations among notions of privacy for RFID authentication protocols. (English) Zbl 1404.94133 Foresti, Sara (ed.) et al., Computer security – ESORICS 2012. 17th European symposium on research in computer security, Pisa, Italy, September 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33166-4/pbk). Lecture Notes in Computer Science 7459, 661-678 (2012). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{D. Moriyama} et al., Lect. Notes Comput. Sci. 7459, 661--678 (2012; Zbl 1404.94133) Full Text: DOI OpenURL
Zhang, Gui-Ying; Dai, Yu-Jie; Zhang, Xiao-Xing; Lv, Ying-Jie Adaptive impedance matching system for downlink of passive semi-ultra wideband ultra-high frequency radio frequency identification tag. (English) Zbl 1263.93123 Int. J. Adapt. Control Signal Process. 26, No. 6, 530-540 (2012). MSC: 93C40 93C95 94A12 PDF BibTeX XML Cite \textit{G.-Y. Zhang} et al., Int. J. Adapt. Control Signal Process. 26, No. 6, 530--540 (2012; Zbl 1263.93123) Full Text: DOI OpenURL
Heyse, Stefan; Kiltz, Eike; Lyubashevsky, Vadim; Paar, Christof; Pietrzak, Krzysztof Lapin: an efficient authentication protocol based on ring-LPN. (English) Zbl 1282.94078 Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 346-365 (2012). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{S. Heyse} et al., Lect. Notes Comput. Sci. 7549, 346--365 (2012; Zbl 1282.94078) Full Text: DOI OpenURL
Xu, Jinpeng; Jiang, Wei; Feng, Gengzhong; Tian, Jun Comparing improvement strategies for inventory inaccuracy in a two-echelon supply chain. (English) Zbl 1253.90038 Eur. J. Oper. Res. 221, No. 1, 213-221 (2012). MSC: 90B05 91A65 PDF BibTeX XML Cite \textit{J. Xu} et al., Eur. J. Oper. Res. 221, No. 1, 213--221 (2012; Zbl 1253.90038) Full Text: DOI OpenURL
Davis, Lauren; Samanlioglu, Funda; Jiang, Xiaochun; Mota, Daniel; Stanfield, Paul A heuristic approach for allocation of data to RFID tags: a data allocation knapsack problem (DAKP). (English) Zbl 1251.90017 Comput. Oper. Res. 39, No. 1, 93-104 (2012). MSC: 90-08 90C59 90C10 PDF BibTeX XML Cite \textit{L. Davis} et al., Comput. Oper. Res. 39, No. 1, 93--104 (2012; Zbl 1251.90017) Full Text: DOI OpenURL
Baek, Sangkyu; Park, Jinsoo; Choi, Bong Dae Performance analysis of transmission rate control algorithm from readers to a middleware in intelligent transportation systems. (English) Zbl 1246.68073 Numer. Algebra Control Optim. 2, No. 2, 357-375 (2012). MSC: 68M20 90B18 90B06 90B22 PDF BibTeX XML Cite \textit{S. Baek} et al., Numer. Algebra Control Optim. 2, No. 2, 357--375 (2012; Zbl 1246.68073) Full Text: DOI OpenURL
Hernandez-Castro, Julio Cesar; Estevez-Tapiador, Juan Manuel; Peris-Lopez, Pedro; Clark, John A.; Talbi, El-Ghazali Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. (English) Zbl 1259.94063 Int. J. Found. Comput. Sci. 23, No. 2, 543-553 (2012). MSC: 94A62 68T20 PDF BibTeX XML Cite \textit{J. C. Hernandez-Castro} et al., Int. J. Found. Comput. Sci. 23, No. 2, 543--553 (2012; Zbl 1259.94063) Full Text: DOI OpenURL
Batina, Lejla; Seys, Stefaan; Singelée, Dave; Verbauwhede, Ingrid Hierarchical ECC-based RFID authentication protocol. (English) Zbl 1436.94038 Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 183-201 (2012). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{L. Batina} et al., Lect. Notes Comput. Sci. 7055, 183--201 (2012; Zbl 1436.94038) Full Text: DOI Link OpenURL
Fernàndez-Mir, Albert; Trujillo-Rasua, Rolando; Castellà-Roca, Jordi; Domingo-Ferrer, Josep A scalable RFID authentication protocol supporting ownership transfer and controlled delegation. (English) Zbl 1436.94060 Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 147-162 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Fernàndez-Mir} et al., Lect. Notes Comput. Sci. 7055, 147--162 (2012; Zbl 1436.94060) Full Text: DOI Link OpenURL
Chai, Qi; Gong, Guang BUPLE: securing passive RFID communication through physical layer enhancements. (English) Zbl 1436.94045 Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 127-146 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{Q. Chai} and \textit{G. Gong}, Lect. Notes Comput. Sci. 7055, 127--146 (2012; Zbl 1436.94045) Full Text: DOI OpenURL
Amariucai, George T.; Bergman, Clifford; Guan, Yong An automatic, time-based, secure pairing protocol for passive RFID. (English) Zbl 1436.94028 Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 108-126 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{G. T. Amariucai} et al., Lect. Notes Comput. Sci. 7055, 108--126 (2012; Zbl 1436.94028) Full Text: DOI Link OpenURL
Abyaneh, Mohammad Reza Sohizadeh Security analysis of two distance-bounding protocols. (English) Zbl 1436.94026 Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 94-107 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{M. R. S. Abyaneh}, Lect. Notes Comput. Sci. 7055, 94--107 (2012; Zbl 1436.94026) Full Text: DOI arXiv Link OpenURL
Kardaş, Süleyman; Kiraz, Mehmet Sabir; Bingöl, Muhammed Ali; Demirci, Hüseyin A novel RFID distance bounding protocol based on physically unclonable functions. (English) Zbl 1436.94072 Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 78-93 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Kardaş} et al., Lect. Notes Comput. Sci. 7055, 78--93 (2012; Zbl 1436.94072) Full Text: DOI Link OpenURL
Kasper, Timo; Oswald, David; Paar, Christof Side-channel analysis of cryptographic RFIDs with analog demodulation. (English) Zbl 1436.94073 Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 61-77 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Kasper} et al., Lect. Notes Comput. Sci. 7055, 61--77 (2012; Zbl 1436.94073) Full Text: DOI OpenURL
Pendl, Christian; Pelnar, Markus; Hutter, Michael Elliptic curve cryptography on the WISP UHF RFID tag. (English) Zbl 1436.94087 Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 32-47 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Pendl} et al., Lect. Notes Comput. Sci. 7055, 32--47 (2012; Zbl 1436.94087) Full Text: DOI OpenURL
Guo, Fuchun; Mu, Yi; Susilo, Willy; Varadharajan, Vijay A pre-computable signature scheme with efficient verification for RFID. (English) Zbl 1292.68052 Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 1-16 (2012). MSC: 68P25 94A60 94A62 PDF BibTeX XML Cite \textit{F. Guo} et al., Lect. Notes Comput. Sci. 7232, 1--16 (2012; Zbl 1292.68052) Full Text: DOI OpenURL
Malek, Behzad; Miri, Ali Private identification of RFID tags. (English) Zbl 1302.94056 Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 49-61 (2012). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{B. Malek} and \textit{A. Miri}, Lect. Notes Comput. Sci. 6888, 49--61 (2012; Zbl 1302.94056) Full Text: DOI OpenURL
Burmester, Mike Localization privacy. (English) Zbl 1300.94043 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 425-441 (2012). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Burmester}, Lect. Notes Comput. Sci. 6805, 425--441 (2012; Zbl 1300.94043) Full Text: DOI OpenURL
Qian, Zhuzhong; Chen, Ce; You, Ilsun; Lu, Sanglu ACSP: A novel security protocol against counting attack for UHF RFID systems. (English) Zbl 1354.94045 Comput. Math. Appl. 63, No. 2, 492-500 (2012). MSC: 94A60 68P30 PDF BibTeX XML Cite \textit{Z. Qian} et al., Comput. Math. Appl. 63, No. 2, 492--500 (2012; Zbl 1354.94045) Full Text: DOI OpenURL
Mihailescu, Marius Iulian Research on solutions for preventing algebraic attacks against biometric and RFID protocols. (English) Zbl 1340.68010 Acta Univ. Apulensis, Math. Inform., Spec. Iss., 371-386 (2011). MSC: 68M12 94A60 94A62 PDF BibTeX XML Cite \textit{M. I. Mihailescu}, Acta Univ. Apulensis, Math. Inform., 371--386 (2011; Zbl 1340.68010) OpenURL
Chien, Hung-Yu; Yeh, Ming-Kuei; Wu, Tzong-Chen; Lee, Chin-I Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups. (English) Zbl 1312.94112 J. Shanghai Jiaotong Univ., Sci. 16, No. 5, 604-609 (2011). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{H.-Y. Chien} et al., J. Shanghai Jiaotong Univ., Sci. 16, No. 5, 604--609 (2011; Zbl 1312.94112) Full Text: DOI OpenURL
Wu, Jie; Wang, Dong; Sheng, Huan-ye Object tracking and tracing: hidden semi-Markov model based probabilistic location determination. (English) Zbl 1294.68131 J. Shanghai Jiaotong Univ., Sci. 16, No. 4, 466-473 (2011). MSC: 68T20 62H12 62F10 PDF BibTeX XML Cite \textit{J. Wu} et al., J. Shanghai Jiaotong Univ., Sci. 16, No. 4, 466--473 (2011; Zbl 1294.68131) Full Text: DOI OpenURL
Wu, Chau-Chen; Jian, Ming-Shen; Chou, Ta Yuan Environmental affection based RFID potential bio-disease tracking/tracing system. (English) Zbl 1279.93075 WSEAS Trans. Syst. 10, No. 2, 38-48 (2011). MSC: 93C83 92B99 PDF BibTeX XML Cite \textit{C.-C. Wu} et al., WSEAS Trans. Syst. 10, No. 2, 38--48 (2011; Zbl 1279.93075) Full Text: Link OpenURL
Yap, Huihui; Khoo, Khoongming; Poschmann, Axel; Henricksen, Matt EPCBC – a block cipher suitable for electronic product code encryption. (English) Zbl 1307.94111 Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10–12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 76-97 (2011). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Yap} et al., Lect. Notes Comput. Sci. 7092, 76--97 (2011; Zbl 1307.94111) Full Text: DOI OpenURL
Habibi, Mohammad Hassan; Aref, Mohammad Reza; Ma, Di Addressing flaws in RFID authentication protocols. (English) Zbl 1291.94187 Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 216-235 (2011). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{M. H. Habibi} et al., Lect. Notes Comput. Sci. 7107, 216--235 (2011; Zbl 1291.94187) Full Text: DOI OpenURL
Sohizadeh Abyaneh, Mohammad Reza Passive cryptanalysis of the unconditionally secure authentication protocol for RFID systems. (English) Zbl 1297.94121 Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 92-103 (2011). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{M. R. Sohizadeh Abyaneh}, Lect. Notes Comput. Sci. 6829, 92--103 (2011; Zbl 1297.94121) Full Text: DOI arXiv Link OpenURL
Guo, Jian; Peyrin, Thomas; Poschmann, Axel; Robshaw, Matt The LED block cipher. (English) Zbl 1291.94092 Preneel, Bart (ed.) et al., Cryptographic hardware and embedded systems – CHES 2011. 13th international workshop, Nara, Japan, September 28–October 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-23950-2/pbk). Lecture Notes in Computer Science 6917, 326-341 (2011). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{J. Guo} et al., Lect. Notes Comput. Sci. 6917, 326--341 (2011; Zbl 1291.94092) Full Text: DOI OpenURL
Peris-Lopez, Pedro; Hernandez-Castro, Julio Cesar; Phan, Raphael C.-W.; Tapiador, Juan M. E.; Li, Tieyan Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol. (English) Zbl 1295.94188 Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 427-442 (2011). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{P. Peris-Lopez} et al., Lect. Notes Comput. Sci. 6584, 427--442 (2011; Zbl 1295.94188) Full Text: DOI OpenURL
Deng, Qiangdong; Wang, Libin Security proof of Molnar protocol. (Chinese. English summary) Zbl 1215.94074 J. Comput. Appl. 31, No. 3, 798-800 (2011). MSC: 94A62 PDF BibTeX XML Cite \textit{Q. Deng} and \textit{L. Wang}, J. Comput. Appl. 31, No. 3, 798--800 (2011; Zbl 1215.94074) Full Text: DOI OpenURL
Dolev, Shlomi; Kopeetsky, Marina; Shamir, Adi RFID authentication efficient proactive information security within computational security. (English) Zbl 1208.94055 Theory Comput. Syst. 48, No. 1, 132-149 (2011). MSC: 94A62 94A60 68M12 PDF BibTeX XML Cite \textit{S. Dolev} et al., Theory Comput. Syst. 48, No. 1, 132--149 (2011; Zbl 1208.94055) Full Text: DOI OpenURL