Security in RFID:
Related Papers of Security in RFID in IJNS (IJNS)
Related Papers of Security in RFID in IJEIE (IJEIE)
Chia-Hui Wei, Cheng-Ying Yang, Min-Shiang Hwang, Augustin Yeh-hao Chin, "Cryptanalysis of Li-Wang Authentication Protocol for Secure and Efficient in RFID Communication", 3rd International Conference on Intelligent Computing, Communication and Devices (ICCD-2017), December 9-10, 2017, Shenzhen, China, Recent Developments in Intelligent Computing, Communication and Devices, Advances in Intelligent Systems and Computing 752, SpringerP350
Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-Hao Chin, "A Secure Privacy and Authentication Protocol for Passive RFID Tags", International Journal of Mobile Communications, vol. 15, no. 3, pp. 266-277, 2017.P085
Chia-Hui Wei, Min-Shiang Hwang, and Augustin Yeh-hao Chin, "Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection", IETE Technical Review, vol. 32, no. 3, pp. 183-187, 2015.P304
Chia-Hui Wei, Min-Shiang Hwang and Augustin Yeh-Hao Chin, "An Improved Authentication Protocol for Mobile Agent Device in RFID," International Journal of Mobile Communications, vol. 10, no. 5, pp.508-520, 2012.P250
Chia-Hui Wei, Min-Shiang Hwang, and Augustin Yeh-Hao Chin, "An Authentication Protocol for Low-cost RFID Tags", International Journal of Mobile Communications, Vol. 9, No. 2, PP. 208-223, 2011.P041
Chia-Hui Wei, Min-Shiang Hwang, Augustin Yeh-hao Chin, "A Mutual Authentication Protocol for RFID", IEEE IT Professional, vol. 13, no. 2, pp. 20-24, March/April 2011.P097
Min-Shiang Hwang, Chia-Hui Wei, Cheng-Yee Lee, "Privacy and Security Requirements for RFID Applications", Journal of Computers (Taiwan), Vol. 20, No. 3, pp. 55-60, Oct. 2009.P103
Hao-Ju Wu, Yi-Hsin Chang, Min-Shiang Hwang, Iuon-Chang Lin, "Flexible RFID Location System Based on Artificial Neural Networks for Medical Care Facilities", ACM SIGBED Review, vol. 6, no. 2, July 2009.P085-1
Yung-Chin Chen, Wei-Lin Wang, Min-Shiang Hwang, "Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection", Asian Journal of Health and Information SCiences, Vol. 1, no. 2, pp. 189-203, 2006.P085