Habibi et al., 2015
| Publication | Publication Date | Title |
|---|---|---|
| Dinarvand et al. | An efficient and secure RFID authentication protocol using elliptic curve cryptography | |
| He et al. | Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol | |
| Chen et al. | ECC-based untraceable authentication for large-scale active-tag RFID systems | |
| Zhuang et al. | A new ultralightweight RFID protocol for low-cost tags: R 2 AP | |
| Kardaş et al. | Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems | |
| Shariq et al. | URASP: An ultralightweight RFID authentication scheme using permutation operation | |
| Chen et al. | A secure ownership transfer protocol using EPCglobal Gen-2 RFID | |
| Deng et al. | Tree-LSHB+: An LPN-based lightweight mutual authentication RFID protocol | |
| Zhou et al. | A lightweight anti-desynchronization RFID authentication protocol | |
| Alagheband et al. | Unified privacy analysis of new‐found RFID authentication protocols | |
| Mohsin et al. | Exploring the RFID mutual authentication domain | |
| Munilla et al. | Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme | |
| Habibi et al. | Attacks on recent RFID authentication protocols | |
| Kumar et al. | Mutual authentication protocol for low cost passive tag in RFID system | |
| Erguler et al. | Security flaws in a recent RFID delegation protocol | |
| Moradi et al. | Security analysis and strengthening of an RFID lightweight authentication protocol suitable for VANETs | |
| Kardaş et al. | An efficient and private RFID authentication protocol supporting ownership transfer | |
| Asadpour et al. | Scalable, privacy preserving radio‐frequency identification protocol for the internet of things | |
| Yang et al. | A privacy model for RFID tag ownership transfer | |
| Habibi et al. | Addressing flaws in RFID authentication protocols | |
| Piramuthu | Vulnerabilities of RFID protocols proposed in ISF | |
| Kardaş et al. | Providing resistance against server information leakage in RFID systems | |
| Habibi et al. | Security and privacy analysis of Song–Mitchell RFID authentication protocol | |
| Erguler et al. | Practical attacks and improvements to an efficient radio frequency identification authentication protocol | |
| Bilal et al. | Ultra-lightweight mutual authentication protocols: Weaknesses and countermeasures |