A taxonomy of system attacker behavior reveals security vulnerabilities in RFID authorization and monitoring systems.
暂无分享,去创建一个
[1] Jacky Hartnett,et al. Deckard: A System to Detect Change of RFID Tag Ownership , 2007 .
[2] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[3] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[4] Gerhard P. Hancke. Practical attacks on proximity identification systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[5] Ari Juels,et al. Technology Evaluation: The Security Implications of VeriChip Cloning , 2006, J. Am. Medical Informatics Assoc..
[6] Adi Shamir,et al. Remote Password Extraction from RFID Tags , 2007, IEEE Transactions on Computers.
[7] Andrew S. Tanenbaum,et al. Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[8] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[9] Samir Chatterjee,et al. A Taxonomy for RFID , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[10] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[11] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .