Security Analysis and Implementation Leveraging Globally Networked RFIDs
暂无分享,去创建一个
Dongho Won | Namje Park | Seungjoo Kim | Howon Kim | Seungjoo Kim | Dongho Won | Namje Park | Howon Kim
[1] Dongho Won,et al. WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment , 2006, APWeb Workshops.
[2] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[3] By Toshiyuki TSUJI,et al. Asset Management Solution Based on RFID , 2004 .
[4] Minglu Li,et al. Advanced Web and Network Technologies, and Applications , 2006 .
[5] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[6] Cheol Sig Pyo,et al. An RFID Tag Using a Planar Inverted-F Antenna Capable of Being Stuck to Metallic Objects , 2006 .
[7] 日本電気株式会社. NEC journal of advanced technology , 2004 .
[8] Hyunsoo Yoon,et al. Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network , 2005 .
[9] Toshiyuki Tsuji,et al. Asset management salution based on RFID , 2004 .
[10] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[11] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[12] Jongsu Lee,et al. An Analysis of Consumer Preferences among Wireless LAN and Mobile Internet Services , 2006 .
[13] S.A. Weis. RFID privacy workshop , 2004, IEEE Security & Privacy Magazine.