Journal cover image

Browse issues

Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Security and Networks

2010 Vol. 5 No. 2/3

Special Issue on Security and Privacy in RFID Systems

Guest Editors: Hua Wang and Xiaohua Jia


PagesTitle and authors
79-86An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
Xuefei Leng, Yuan-Hung Lien, Keith Mayes, Konstantinos Markantonakis
DOI: 10.1504/IJSN.2010.032206

87-95Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees
George C. Dalton II, Kenneth S. Edge, Robert F. Mills, Richard A. Raines
DOI: 10.1504/IJSN.2010.032207

96-105Trust in RFID-enabled Supply-Chain Management
Manmeet Mahinderjit-Singh, Xue Li
DOI: 10.1504/IJSN.2010.032208

106-118On the security of RFID devices against implementation attacks
Michael Hutter, Thomas Plos, Martin Feldhofer
DOI: 10.1504/IJSN.2010.032209

119-127Secure and efficient data transmission in RFID sensor networks
Yasuhiro Imasaki, Yongbing Zhang, Yusheng Ji
DOI: 10.1504/IJSN.2010.032210

128-134Security and privacy on low-cost Radio Frequency Identification systems
L. Sun
DOI: 10.1504/IJSN.2010.032211

135-146Looking at a class of RFID APs through GNY logic
Xiaowen Zhang, Qinghai Gao, Mohamed K. Saad
DOI: 10.1504/IJSN.2010.032212

147-155Radio frequency identification: a case study of healthcare organisations
Susana Garrido Azevedo, Joao J. Ferreira
DOI: 10.1504/IJSN.2010.032213

156-164A ubiquitous mobile telemedicine system for the elderly using RFID
Muhammad Wassim Raad
DOI: 10.1504/IJSN.2010.032214

165-172Perceived barriers to the widespread commercial use of Radio Frequency Identification technology
Mark J. Rodrigues, Kieran James
DOI: 10.1504/IJSN.2010.032215

Additional papers

173-187Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
H. Guo, Y. Mu, X.Y. Zhang, Z.J. Li
DOI: 10.1504/IJSN.2010.032216

188-197Security assessments of IEEE 802.15.4 standard based on X.805 framework
Afolabi O. Richard, Aftab Ahmad, Kim Kiseon
DOI: 10.1504/IJSN.2010.032217

198-205Experimental analysis of application-level intrusion detection algorithms
Yuhong Dong, Sam Hsu, Saeed Rajput, Bing Wu
DOI: 10.1504/IJSN.2010.032218