Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard MH Habibi, M Gardeshi, MR Alaghband arXiv preprint arXiv:1102.0763, 2011 | 37 | 2011 |
Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard MH Habibi, MR Alagheband, MR Aref Information Security Theory and Practice. Security and Privacy of Mobile …, 2011 | 31 | 2011 |
Addressing flaws in RFID authentication protocols MH Habibi, MR Aref, D Ma Progress in Cryptology–INDOCRYPT 2011: 12th International Conference on …, 2011 | 14 | 2011 |
Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard MH Habibi, M Gardeshi 2011 8th International ISC Conference on Information Security and Cryptology …, 2011 | 11 | 2011 |
Attacks on recent RFID authentication protocols MH Habibi, MR Aref Journal of Signal Processing Systems 79, 271-283, 2015 | 10 | 2015 |
Cryptanalysis of two mutual authentication protocols for low-cost RFID MH Habibi, M Gardeshi, MR Alaghband arXiv preprint arXiv:1102.0858, 2011 | 10 | 2011 |
Security and privacy analysis of Song–Mitchell RFID authentication protocol MH Habibi, MR Aref Wireless personal communications 69, 1583-1596, 2013 | 9 | 2013 |
Two RFID privacy models in front of a court MH Habibi, MR Aref Cryptology ePrint Archive, 2011 | 5 | 2011 |
Attacks and improvements to a new RFID Authentication protocol MH Habibi, M Gardeshi, MR Alagheband Radio Frequency Identification System Security, 66-80, 2011 | 5 | 2011 |