
International Journal of Security and Networks
2010 Vol.5 No.2/3
Special Issue on Security and Privacy in RFID Systems
Guest Editors: Hua Wang and Xiaohua Jia
Pages | Title and author(s) |
79-86 | An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividingXuefei Leng, Yuan-Hung Lien, Keith Mayes, Konstantinos Markantonakis DOI: 10.1504/IJSN.2010.032206 |
87-95 | Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection treesGeorge C. Dalton II, Kenneth S. Edge, Robert F. Mills, Richard A. Raines DOI: 10.1504/IJSN.2010.032207 |
96-105 | Trust in RFID-enabled Supply-Chain ManagementManmeet Mahinderjit-Singh, Xue Li DOI: 10.1504/IJSN.2010.032208 |
106-118 | On the security of RFID devices against implementation attacksMichael Hutter, Thomas Plos, Martin Feldhofer DOI: 10.1504/IJSN.2010.032209 |
119-127 | Secure and efficient data transmission in RFID sensor networksYasuhiro Imasaki, Yongbing Zhang, Yusheng Ji DOI: 10.1504/IJSN.2010.032210 |
128-134 | Security and privacy on low-cost Radio Frequency Identification systemsL. Sun DOI: 10.1504/IJSN.2010.032211 |
135-146 | Looking at a class of RFID APs through GNY logicXiaowen Zhang, Qinghai Gao, Mohamed K. Saad DOI: 10.1504/IJSN.2010.032212 |
147-155 | Radio frequency identification: a case study of healthcare organisationsSusana Garrido Azevedo, Joao J. Ferreira DOI: 10.1504/IJSN.2010.032213 |
156-164 | A ubiquitous mobile telemedicine system for the elderly using RFIDMuhammad Wassim Raad DOI: 10.1504/IJSN.2010.032214 |
165-172 | Perceived barriers to the widespread commercial use of Radio Frequency Identification technologyMark J. Rodrigues, Kieran James DOI: 10.1504/IJSN.2010.032215 |
Additional papers |
173-187 | Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward securityH. Guo, Y. Mu, X.Y. Zhang, Z.J. Li DOI: 10.1504/IJSN.2010.032216 |
188-197 | Security assessments of IEEE 802.15.4 standard based on X.805 frameworkAfolabi O. Richard, Aftab Ahmad, Kim Kiseon DOI: 10.1504/IJSN.2010.032217 |
198-205 | Experimental analysis of application-level intrusion detection algorithmsYuhong Dong, Sam Hsu, Saeed Rajput, Bing Wu DOI: 10.1504/IJSN.2010.032218 |