Volume 3 (2014/2015)
Issue 1, June 2014/2015
Pages | Title | Author(s) | Papers |
107 - 118 | A Secure Platform for Information Sharing in EPCglobal Network DOI: 10.20533/ijrfidsc.2046.3715.2014.0013 |
Jie Shi, Yingjiu Li, Robert H. Deng, Wei He, Eng Wah Lee | |
119 - 124 | A Comprehensive and Comparative Study of Elliptic Curve Cryptography Hardware Implementations for WSN DOI: 10.20533/ijrfidsc.2046.3715.2014.0014 |
Nabil Ghanmy, Lamia Chaari Fourati, Lotfi Kamoun | |
125 - 136 | Securing Low-cost RFID Systems: A Research Survey DOI: 10.20533/ijrfidsc.2046.3715.2014.0015 |
Qi Chai |
Issue 2, December 2014/2015
Pages | Title | Author(s) | Papers |
137 - 147 | Addressing NFC Mobile Relay Attacks: NFC User Key Confirmation Protocols DOI: 10.20533/ijrfidsc.2046.3715.2014.0016 |
Ali Alshehri, Steve Schneider | |
148 - 155 | Discovering Suppliers’ Customers by means of Statistical Disclosure Attacks DOI: 10.20533/ijrfidsc.2046.3715.2014.0017 |
Simon D. Rihs, André Miede | |
156 - 169 | A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags DOI: 10.20533/ijrfidsc.2046.3715.2014.0018 |
Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes | |
170 - 176 | Analysis of PRNGs with Large State Spaces and Structural Improvements DOI: 10.20533/ijrfidsc.2046.3715.2014.0019 |
Gabriele Spenger, Jörg Keller |