User interface prototyping-concepts, tools, and experience

D Baumer, W Bischofberger, H Lichter… - Proceedings of IEEE …, 1996 - ieeexplore.ieee.org
In recent years the development of highly interactive software systems with graphical user
interfaces has become increasingly common. The acceptance of such a system depends to …

Flaws on RFID grouping-proofs. Guidelines for future sound protocols

P Peris-Lopez, A Orfila, JC Hernandez-Castro… - Journal of Network and …, 2011 - Elsevier
During the last years many RFID authentication protocols have been proposed with major or
minor success (van Deursen and Radomirović, 2008). Juels (2004) introduced a different …

Grouping-proofs-based authentication protocol for distributed RFID systems

H Liu, H Ning, Y Zhang, D He, Q Xiong… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Along with radio frequency identification (RFID) becoming ubiquitous, security issues have
attracted extensive attentions. Most studies focus on the single-reader and single-tag case to …

Lightweight RFID authentication with forward and backward security

M Burmester, J Munilla - ACM Transactions on Information and System …, 2011 - dl.acm.org
We propose a lightweight RFID authentication protocol that supports forward and backward
security. The only cryptographic mechanism that this protocol uses is a pseudorandom …

An RFID-based smart structure for the supply chain: Resilient scanning proofs and ownership transfer with positive secrecy capacity channels

M Burmester, J Munilla, A Ortiz, P Caballero-Gil - Sensors, 2017 - mdpi.com
The National Strategy for Global Supply Chain Security published in 2012 by the White
House identifies two primary goals for strengthening global supply chains: first, to promote …

A robust grouping proof protocol for RFID EPC C1G2 tags

S Sundaresan, R Doss, S Piramuthu… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Several grouping proof protocols for RFID systems have been proposed over the years but
they are either found to be vulnerable to certain attacks or do not comply with the EPC class …

[PDF][PDF] 物联网环境下UC 安全的组证明RFID 协议

张忠, 徐秋亮 - 2011 - cf.lcchina.org.cn
Security and privacy block the development of the Internet of Things (IOT). How to design a
RFID grouping—proof protocol with security and high efficiency is a key problem in the …

Tree-based RFID yoking proof

HY Chien, SB Liu - 2009 international conference on networks …, 2009 - ieeexplore.ieee.org
RFID (radio frequency identification) yoking proof protocol allows a verifier to collect the
proof of the simultaneous presence of two tags in the communication range of a specified …

Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs

L Batina, YK Lee, S Seys, D Singelée… - Personal and Ubiquitous …, 2012 - Springer
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to
generate evidence that they have been scanned simultaneously, various new schemes …

Integrating SaaS and SaaP with dew computing

Y Wang, D Leblanc - … Conferences on Big Data and Cloud …, 2016 - ieeexplore.ieee.org
Software as a Service (SaaS) is one of the major service models of cloud computing and a
new software delivery model, in this software delivery model, software is hosted centrally, is …