Secured access control for vehicles in RFID systems on roads
暂无分享,去创建一个
[1] M.A. Ibarra-Manzano,et al. Design and implementation of a vehicular access control using RFID , 2006, 2006 Multiconference on Electronics and Photonics.
[2] Ying Cai,et al. Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[3] Benjamin C. M. Fung,et al. Walking in the crowd: anonymizing trajectory data for pattern analysis , 2009, CIKM.
[4] Dong Hwi Lee,et al. A Study About Security Awareness Program Based on RFID Access Control System , 2012, ICITCS.
[5] Yücel Saygin,et al. Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.
[6] Nikos Mamoulis,et al. Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).
[7] Torben Bach Pedersen,et al. Privacy-Preserving Data Mining on Moving Object Trajectories , 2007, 2007 International Conference on Mobile Data Management.
[8] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[9] Pan Xiang. Research and Implementation of Access Control System Based on RFID and FNN-Face Recognition , 2012, 2012 Second International Conference on Intelligent System Design and Engineering Application.
[10] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[11] Marc Joye,et al. Hessian Elliptic Curves and Side-Channel Attacks , 2001, CHES.
[12] Jiming Chen,et al. Sensory-data-enhanced authentication for RFID-based access control systems , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).
[13] Wei Cheng,et al. On the Design and Deployment of RFID Assisted Navigation Systems for VANETs , 2012, IEEE Transactions on Parallel and Distributed Systems.
[14] Xiang Pan. Research and Implementation of Access Control System Based on RFID and FNN-Face Recognition , 2012 .
[15] Laks V. S. Lakshmanan,et al. Anonymizing moving objects: how to hide a MOB in a crowd? , 2009, EDBT '09.
[16] Yulin Zhang,et al. A design of bi-verification vehicle access intelligent control system based on RFID , 2009, 2009 9th International Conference on Electronic Measurement & Instruments.
[17] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[18] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[19] M. Deriche,et al. A hybrid RFID-LPR system for vehicle access control during Pilgrimage season in Saudi Arabia , 2012, International Multi-Conference on Systems, Sygnals & Devices.
[20] Ao Chen,et al. ZigBee-based Vehicle Access Control System , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.