1. Comparative Study of Elliptic Curve Cryptography Hardware Implementations in Wireless Sensor Networks. Issue 1 (2013) Authors: Houssain, Hilal; Badra, Mohamad; Al-Somani, Turki F. Journal: International journal of RFID security and cryptography Issue: Volume 2:Issue 1(2013) Page Start: 67 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Design and Implementation of an Encryption Algorithm for use in RFID System. Issue 1 (2013) Authors: Abdelhalim, M. B.; El-Mahallawy, M.; Ayyad, M.; Elhennawy, A. Journal: International journal of RFID security and cryptography Issue: Volume 2:Issue 1(2013) Page Start: 51 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol. Issue 1 (2013) Authors: Bassil, Ramzi; El-Beaino, Wissam; Itani, Wassim; Kayssi, Ayman; Chehab, Ali Journal: International journal of RFID security and cryptography Issue: Volume 2:Issue 1(2013) Page Start: 58 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Addressing NFC Mobile Relay Attacks: NFC User Key Confirmation Protocols. Issue 2 (2013) Authors: Alshehri, Ali; Schneider, Steve Journal: International journal of RFID security and cryptography Issue: Volume 3:Issue 2(2014/2015) Page Start: 137 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags. Issue 2 (2014) Authors: Abughazalah, Sarah; Markantonakis, Konstantinos; Mayes, Keith Journal: International journal of RFID security and cryptography Issue: Volume 3:Issue 2(2014/2015) Page Start: 157 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Discovering Suppliers' Customers by means of Statistical Disclosure Attacks. Issue 2 (2014) Authors: Rihs, Simon D.; Miede, André Journal: International journal of RFID security and cryptography Issue: Volume 3:Issue 2(2014/2015) Page Start: 148 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Analysis of PRNGs with Large State Spaces and Structural Improvements. Issue 2 (2014) Authors: Spenger, Gabriele; Keller, Jörg Journal: International journal of RFID security and cryptography Issue: Volume 3:Issue 2(2014/2015) Page Start: 170 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Efficient Approach for Redundant Reader Elimination for Directional Antenna in RFID Networks. Issue 2 (2013) Authors: Irfan, Nazish; Yagoub, Mustapha C.E.; Hettak, Kelifa Journal: International journal of RFID security and cryptography Issue: Volume 2:Issue 2(2013) Page Start: 74 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones. Issue 2 (2013) Authors: Francis, Lishoy; Hancke, Gerhard; Mayes, Keith Journal: International journal of RFID security and cryptography Issue: Volume 2:Issue 2(2013) Page Start: 92 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Passive RFID Tags. Issue 2 (2013) Authors: Mandal, Kalikinkar; Fan, Xinxin; Gong, Guang Journal: International journal of RFID security and cryptography Issue: Volume 2:Issue 2(2013) Page Start: 82 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗