A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Untraceable RFID authentication protocols: Revision of EC-RAC
2009
2009 IEEE International Conference on RFID
More precisely, we first revise the EC-RAC (Elliptic Curve Based Randomized Access Control) protocol and we expand it into several authentication protocols. ...
However, additional security always comes at price and the scarceness of resources on a tag makes conventional privacy-preserving protocols infeasible. ...
Cryptanalysis of EC-RAC The EC-RAC protocol is aimed to be secure against the tracking attack [11] . ...
doi:10.1109/rfid.2009.4911179
fatcat:nh6y46ffnfeftnoizbihiyluve
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
Certificateless-based signature can also overcome the certificate management problem and the key escrow problem of the traditional signature system. ...
Acknowledgments
Acknowledgments This study was supported by the National Science Council of Taiwan under grant NSC102-2221-E-468-020 and NSC101-2622-E-468-002-CC3. ...
This work is supported by Natural Science Foundation of Shandong Province(NO.ZR2013FM009).
Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments. ...
fatcat:u6ux7gsrj5efxp3xc4y2gpmahu
2016 Jahresbericht Annual Report
unpublished
The organisers would like to express their gratitude to the participants and the Schloss Dagstuhl team for a productive and exciting seminar. ...
We organizers are all thankful to the participants, who all brought a unique insight to the seminar, which in my humble opinion, succeeded in its aims. ...
RAC (Right Angle Crossing) graphs: a graph which has a straight-line drawing with right angle crossings. ...
fatcat:oef4sw3ebbcwhe7qbtizni4lfy