- 暂无内容
- Building Scalable and Private RFID Systems
- Number-Theoretic Reference Problems
- Mathematical Background
- RFID Privacy-Preserving Authentication System and Method
- A Private Authentication Method in Radio Frequency Identification Systems
- Privacy-preserving Authentication with Low Computational Overhead for RFID Systems
- A New Prime-Phase Sequence Family with Low Correlation and Large Size.
- A Random Walk Based Anonymous Peer-to-Peer Protocol Design
- Pairing-Based Multi-Recipient Public Key Encryption
- Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
- Pseudo Trust: Zero-knowledge Authentication in Anonymous Peer-to-Peer Protocols
- Action: Breaking the Privacy Barrier for RFID Systems
- Refresh: Weak Privacy Model for RFID Systems
- Analysis on Token-Controlled Public Key Encryption
- BEST: A Bidirectional Efficiency-Privacy Transferable Authentication Protocol for RFID-Enabled Supply Chain
- A New Algorithm of Automatic Color Permutation Based on Color Quantization and Its Applications
- Improved ID-Based Encryption
- The Identity-based Cryptography System and the Tate Pairing of Elliptic Curve
- A Voting-based File Authentication Protocol
- Pairing-Based Multi-Recipient Public Key Encryption
- 暂无内容