18 March 2010

Special issue: Security and privacy in RFID systems

International Journal of Security and Networks 5(2/3) 2010
  • An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
  • Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees
  • Trust in RFID-enabled Supply-Chain Management
  • On the security of RFID devices against implementation attacks
  • Secure and efficient data transmission in RFID sensor networks
  • Security and privacy on low-cost Radio Frequency Identification systems
  • Looking at a class of RFID APs through GNY logic
  • Radio frequency identification: a case study of healthcare organisations
  • A ubiquitous mobile telemedicine system for the elderly using RFID
  • Perceived barriers to the widespread commercial use of Radio Frequency Identification technology
Additional papers
  • Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
  • Security assessments of IEEE 802.15.4 standard based on X.805 framework
  • Experimental analysis of application-level intrusion detection algorithms

No comments: