首页 > 最新文献

Asia Workshop on RFID Security最新文献

英文 中文
A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling Application 一种基于移动rfid的椭圆曲线密码互鉴协议在安全巡逻中的应用
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-143-4-63
Wen-Tsai Ko, E. Lu, Shin-Yan Chiou, H. Chang
{"title":"A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling Application","authors":"Wen-Tsai Ko, E. Lu, Shin-Yan Chiou, H. Chang","doi":"10.3233/978-1-61499-143-4-63","DOIUrl":"https://doi.org/10.3233/978-1-61499-143-4-63","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117057622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication 基于哈希互认证的无源UHF RFID标签的单片机实现与评估
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-462-6-3
Yang Li, Shugo Mikami, Dai Watanabe, K. Ohta, K. Sakiyama
{"title":"Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication","authors":"Yang Li, Shugo Mikami, Dai Watanabe, K. Ohta, K. Sakiyama","doi":"10.3233/978-1-61499-462-6-3","DOIUrl":"https://doi.org/10.3233/978-1-61499-462-6-3","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RFID Multi-Ownership Transfer Protocol in VMI Environments VMI环境下的RFID多所有权传输协议
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-462-6-51
N. Lo, I-Fan Wang, Yo-Hsuan Chuang
{"title":"RFID Multi-Ownership Transfer Protocol in VMI Environments","authors":"N. Lo, I-Fan Wang, Yo-Hsuan Chuang","doi":"10.3233/978-1-61499-462-6-51","DOIUrl":"https://doi.org/10.3233/978-1-61499-462-6-51","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117162634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptanalyses of Two Ultralightweight RFID Authentication Protocols 两种超轻量RFID认证协议的密码分析
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-143-4-85
N. Lo, Kuo-Hui Yeh, Hsuan-Yu Chen
{"title":"Cryptanalyses of Two Ultralightweight RFID Authentication Protocols","authors":"N. Lo, Kuo-Hui Yeh, Hsuan-Yu Chen","doi":"10.3233/978-1-61499-143-4-85","DOIUrl":"https://doi.org/10.3233/978-1-61499-143-4-85","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On RFID Authentication Protocols with Wide-Strong Privacy 宽强隐私RFID认证协议研究
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-328-5-3
Nan Li, Y. Mu, W. Susilo, F. Guo, V. Varadharajan
Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zeroknowledge based tag authentication protocols and prove that they offer wide-strong privacy. Disciplines Engineering | Science and Technology Studies Publication Details Li, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V. (2013). On RFID authentication protocols with widestrong privacy. Cryptology and Information Security Series, 11 3-16. This journal article is available at Research Online: http://ro.uow.edu.au/eispapers/1817 On RFID Authentication Protocols with Wide-Strong Privacy 1 Nan Li , Yi Mu , Willy Susilo , Fuchun Guo a and Vijay Varadharajan b a Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia e-mail: {nl864,ymu,wsusilo,fuchun}@uow.edu.au b Information and Networked Systems Security Research, Department of Computing, Faculty of Science, Macquarie University, Sydney,Australia e-mail: vijay.varadharajan@mq.edu.au Abstract. Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy. Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy.
射频识别(RFID)标签的隐私性是RFID安全的一个重要问题。迄今为止,已经有几次尝试通过使用零知识协议来实现宽强隐私。在本文中,我们对最近的RFID基于零知识的身份识别协议进行了攻击,该协议声称可以捕获宽强隐私,并表明该协议存在缺陷。随后,我们提出了两种基于零知识的标签认证协议,并证明了它们具有宽强隐私性。学科工程|科学与技术研究刊发全文李宁,穆旸,苏希洛,W,郭,f, Varadharajan, V.(2013)。具有广强隐私的RFID认证协议研究。密码学与信息安全系列,11 -16。1李楠,穆毅,Willy Susilo,郭福春,Vijay Varadharajan,澳大利亚卧龙岗大学计算机科学与软件工程学院计算机与信息安全研究中心,澳大利亚卧龙岗b澳大利亚悉尼麦考瑞大学理学院计算机系信息与网络系统安全研究e-mail: vijay.varadharajan@mq.edu.au射频识别(RFID)标签的隐私性是RFID安全的一个重要问题。迄今为止,已经有几次尝试通过使用零知识协议来实现宽强隐私。在本文中,我们对最近的RFID基于零知识的身份识别协议进行了攻击,该协议声称可以捕获宽强隐私,并表明该协议存在缺陷。随后,我们提出了两种基于零知识的标签认证协议,并证明了它们具有宽强隐私性。射频识别(RFID)标签的隐私性是RFID安全的一个重要问题。迄今为止,已经有几次尝试通过使用零知识协议来实现宽强隐私。在本文中,我们对最近的RFID基于零知识的身份识别协议进行了攻击,该协议声称可以捕获宽强隐私,并表明该协议存在缺陷。随后,我们提出了两种基于零知识的标签认证协议,并证明了它们具有宽强隐私性。
{"title":"On RFID Authentication Protocols with Wide-Strong Privacy","authors":"Nan Li, Y. Mu, W. Susilo, F. Guo, V. Varadharajan","doi":"10.3233/978-1-61499-328-5-3","DOIUrl":"https://doi.org/10.3233/978-1-61499-328-5-3","url":null,"abstract":"Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zeroknowledge based tag authentication protocols and prove that they offer wide-strong privacy. Disciplines Engineering | Science and Technology Studies Publication Details Li, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V. (2013). On RFID authentication protocols with widestrong privacy. Cryptology and Information Security Series, 11 3-16. This journal article is available at Research Online: http://ro.uow.edu.au/eispapers/1817 On RFID Authentication Protocols with Wide-Strong Privacy 1 Nan Li , Yi Mu , Willy Susilo , Fuchun Guo a and Vijay Varadharajan b a Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia e-mail: {nl864,ymu,wsusilo,fuchun}@uow.edu.au b Information and Networked Systems Security Research, Department of Computing, Faculty of Science, Macquarie University, Sydney,Australia e-mail: vijay.varadharajan@mq.edu.au Abstract. Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy. Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy.","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131302775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions 基于物理不可克隆功能的嵌入式设备远程认证机制
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-328-5-107
Raja Naeem Akram, K. Markantonakis, K. Mayes
Remote attestation mechanisms are well studied in the highend computing environments; however, the same is not true for embedded devices especially for smart cards. With ever changing landscape of smart card technology and advancements towards a true multiapplication platform, verifying the current state of the smart card is signi cant to the overall security of such proposals. The initiatives proposed by GlobalPlatform Consumer Centric Model (GP-CCM) and User Centric Smart Card Ownership Model (UCOM) enables a user to download any application as she desire depending upon the authorisation of the application provider. Before an application provider issues an application to a smart card, verifying the current state of the smart card is crucial to the security of the respective application. In this paper, we analyse the rationale behind the remote attestation mechanism for smart cards, and the fundamental features that such a mechanism should possess. We also study the applicability of Physical Unclonable Functions (PUFs) for the remote attestation mechanism and propose two algorithms to achieve the stated features of remote attestation. The proposed algorithms are implemented in a test environment to evaluate their performance.
远程认证机制在高端计算环境中得到了很好的研究;然而,对于嵌入式设备,尤其是智能卡,情况并非如此。随着智能卡技术的不断变化和向真正的多应用平台的发展,验证智能卡的当前状态对此类建议的整体安全性具有重要意义。GlobalPlatform以消费者为中心模型(GP-CCM)和以用户为中心的智能卡所有权模型(UCOM)提出的倡议使用户能够根据应用程序提供商的授权下载任何她想要的应用程序。在应用程序提供者向智能卡发出应用程序之前,验证智能卡的当前状态对于各自应用程序的安全性至关重要。在本文中,我们分析了智能卡远程认证机制背后的基本原理,以及这种机制应该具备的基本特征。我们还研究了物理不可克隆函数(puf)在远程认证机制中的适用性,并提出了两种实现远程认证特性的算法。在测试环境中实现了所提出的算法,以评估其性能。
{"title":"Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions","authors":"Raja Naeem Akram, K. Markantonakis, K. Mayes","doi":"10.3233/978-1-61499-328-5-107","DOIUrl":"https://doi.org/10.3233/978-1-61499-328-5-107","url":null,"abstract":"Remote attestation mechanisms are well studied in the highend computing environments; however, the same is not true for embedded devices especially for smart cards. With ever changing landscape of smart card technology and advancements towards a true multiapplication platform, verifying the current state of the smart card is signi cant to the overall security of such proposals. The initiatives proposed by GlobalPlatform Consumer Centric Model (GP-CCM) and User Centric Smart Card Ownership Model (UCOM) enables a user to download any application as she desire depending upon the authorisation of the application provider. Before an application provider issues an application to a smart card, verifying the current state of the smart card is crucial to the security of the respective application. In this paper, we analyse the rationale behind the remote attestation mechanism for smart cards, and the fundamental features that such a mechanism should possess. We also study the applicability of Physical Unclonable Functions (PUFs) for the remote attestation mechanism and propose two algorithms to achieve the stated features of remote attestation. The proposed algorithms are implemented in a test environment to evaluate their performance.","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121871508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power 通过改变传输阅读器的功率来保护RFID传输的框架
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-328-5-57
F. Huo, Chouchang Yang, Guang Gong, R. Poovendran
RFID technology has gained tremendous popularity in the recent years. The tiny, inexpensive RFID tags can be easily attached to objects for seamless identification. However, one glaring weakness of RFID tags, especially passive RFID tags is its lack of capability for implementing strong crypto primitives for security purposes. When no or a weak crypto primitive is implemented, the adversary could easily eavesdrop to the communication session between the reader and the tag, he can potentially gain all the secrets about the tag. In doing so, the secrecy of the messages and the privacy of the tag is violated. In this paper, we introduce a new framework that would protect the messages transmitted from the tag to the reader. This framework makes use of the physical properties of RFID systems by sending a random time-varying waveform from the tag to the reader for power harvesting rather than a fixed amplitude waveform. We show theoretically this framework is secure against one eavesdropper by showing the eavesdropper’s decoding error probability is very close to 50%. Furthermore, we have implemented our framework, the experimental results also confirm with our theoretical results. Finally, we will discuss two more stronger forms of attack.
近年来,射频识别技术获得了极大的普及。这种微小、廉价的RFID标签可以很容易地贴在物体上,实现无缝识别。然而,RFID标签,特别是无源RFID标签的一个明显缺点是它缺乏实现安全目的的强加密原语的能力。当没有实现或实现弱密码原语时,攻击者可以很容易地窃听到阅读器与标签之间的通信会话,从而可能获得有关标签的所有秘密。在这样做的过程中,消息的保密性和标记的保密性被破坏了。在本文中,我们引入了一个新的框架来保护从标签传输到阅读器的消息。该框架利用RFID系统的物理特性,从标签向读取器发送随机时变波形以获取能量,而不是固定振幅波形。我们通过显示窃听者的解码错误概率非常接近50%,从理论上证明了该框架对一个窃听者是安全的。此外,我们已经实现了我们的框架,实验结果也证实了我们的理论结果。最后,我们将讨论两种更强的攻击形式。
{"title":"A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power","authors":"F. Huo, Chouchang Yang, Guang Gong, R. Poovendran","doi":"10.3233/978-1-61499-328-5-57","DOIUrl":"https://doi.org/10.3233/978-1-61499-328-5-57","url":null,"abstract":"RFID technology has gained tremendous popularity in the recent years. The tiny, inexpensive RFID tags can be easily attached to objects for seamless identification. However, one glaring weakness of RFID tags, especially passive RFID tags is its lack of capability for implementing strong crypto primitives for security purposes. When no or a weak crypto primitive is implemented, the adversary could easily eavesdrop to the communication session between the reader and the tag, he can potentially gain all the secrets about the tag. In doing so, the secrecy of the messages and the privacy of the tag is violated. In this paper, we introduce a new framework that would protect the messages transmitted from the tag to the reader. This framework makes use of the physical properties of RFID systems by sending a random time-varying waveform from the tag to the reader for power harvesting rather than a fixed amplitude waveform. We show theoretically this framework is secure against one eavesdropper by showing the eavesdropper’s decoding error probability is very close to 50%. Furthermore, we have implemented our framework, the experimental results also confirm with our theoretical results. Finally, we will discuss two more stronger forms of attack.","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129538428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design and Implementation of a Secure Prototype for EPCglobal Network Services EPCglobal网络服务安全原型的设计与实现
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-143-4-45
Jie Shi, Yingjiu Li, R. Deng, K. Chiew
{"title":"Design and Implementation of a Secure Prototype for EPCglobal Network Services","authors":"Jie Shi, Yingjiu Li, R. Deng, K. Chiew","doi":"10.3233/978-1-61499-143-4-45","DOIUrl":"https://doi.org/10.3233/978-1-61499-143-4-45","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Design of Secure APIs for IoT Applications - Using Taiwan Uniform e-Invoices as Examples 物联网应用的安全api设计——以台湾统一电子发票为例
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-143-4-9
Shi-Cho Cha, Jyun-Fu Chen, Shih-Chieh Huang, Chih-Teng Tseng, Wei-Kai Chen
{"title":"On Design of Secure APIs for IoT Applications - Using Taiwan Uniform e-Invoices as Examples","authors":"Shi-Cho Cha, Jyun-Fu Chen, Shih-Chieh Huang, Chih-Teng Tseng, Wei-Kai Chen","doi":"10.3233/978-1-61499-143-4-9","DOIUrl":"https://doi.org/10.3233/978-1-61499-143-4-9","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115560468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags Warbler:用于EPC C1 Gen2标签的轻量级伪随机数生成器
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-143-4-73
K. Mandal, Xinxin Fan, G. Gong
{"title":"Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags","authors":"K. Mandal, Xinxin Fan, G. Gong","doi":"10.3233/978-1-61499-143-4-73","DOIUrl":"https://doi.org/10.3233/978-1-61499-143-4-73","url":null,"abstract":"","PeriodicalId":343843,"journal":{"name":"Asia Workshop on RFID Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123667619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
Asia Workshop on RFID Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1