International Journal of Security and Networks (IJSN)

International Journal of Security and Networks

2010 Vol.5 No.2/3

Special Issue on Security and Privacy in RFID Systems

Guest Editors: Hua Wang and Xiaohua Jia

Editorial

Pages Title and author(s)
79-86An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
Xuefei Leng, Yuan-Hung Lien, Keith Mayes, Konstantinos Markantonakis
DOI: 10.1504/IJSN.2010.032206
87-95Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees
George C. Dalton II, Kenneth S. Edge, Robert F. Mills, Richard A. Raines
DOI: 10.1504/IJSN.2010.032207
96-105Trust in RFID-enabled Supply-Chain Management
Manmeet Mahinderjit-Singh, Xue Li
DOI: 10.1504/IJSN.2010.032208
106-118On the security of RFID devices against implementation attacks
Michael Hutter, Thomas Plos, Martin Feldhofer
DOI: 10.1504/IJSN.2010.032209
119-127Secure and efficient data transmission in RFID sensor networks
Yasuhiro Imasaki, Yongbing Zhang, Yusheng Ji
DOI: 10.1504/IJSN.2010.032210
128-134Security and privacy on low-cost Radio Frequency Identification systems
L. Sun
DOI: 10.1504/IJSN.2010.032211
135-146Looking at a class of RFID APs through GNY logic
Xiaowen Zhang, Qinghai Gao, Mohamed K. Saad
DOI: 10.1504/IJSN.2010.032212
147-155Radio frequency identification: a case study of healthcare organisations
Susana Garrido Azevedo, Joao J. Ferreira
DOI: 10.1504/IJSN.2010.032213
156-164A ubiquitous mobile telemedicine system for the elderly using RFID
Muhammad Wassim Raad
DOI: 10.1504/IJSN.2010.032214
165-172Perceived barriers to the widespread commercial use of Radio Frequency Identification technology
Mark J. Rodrigues, Kieran James
DOI: 10.1504/IJSN.2010.032215

Additional papers

173-187Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
H. Guo, Y. Mu, X.Y. Zhang, Z.J. Li
DOI: 10.1504/IJSN.2010.032216
188-197Security assessments of IEEE 802.15.4 standard based on X.805 framework
Afolabi O. Richard, Aftab Ahmad, Kim Kiseon
DOI: 10.1504/IJSN.2010.032217
198-205Experimental analysis of application-level intrusion detection algorithms
Yuhong Dong, Sam Hsu, Saeed Rajput, Bing Wu
DOI: 10.1504/IJSN.2010.032218