Security on RFID technology
暂无分享,去创建一个
Nabil Kannouf | Youssef Douzi | Mohamed Benabdellah | Abdelmalek Azizi | A. Azizi | M. Benabdellah | Nabil Kannouf | Youssef Douzi
[1] H. Klauk,et al. Fast organic thin-film transistor circuits , 1999, IEEE Electron Device Letters.
[2] Alfred R. Koelle,et al. Short-range radio-telemetry for electronic identification, using modulated RF backscatter , 1975 .
[3] Wiem Tounsi,et al. Security and Privacy Controls in RFID Systems: Applied to EPCglobal Networks , 2014 .
[4] Nora Cuppens-Boulahia,et al. KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems , 2014, J. Netw. Comput. Appl..
[5] A. Laurie. RFID: Practical attacks against RFID , 2007 .
[6] Nandita Srivastava,et al. RFID Introduction, Present and Future applications and Security Implications , 2006 .
[7] F. Aghdasi,et al. Research trends in RFID technology , 2007 .
[8] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[9] H. Stockman,et al. Communication by Means of Reflected Power , 1948, Proceedings of the IRE.
[10] Herve Aubert,et al. RFID technology for human implant devices , 2011 .
[11] Aikaterini Mitrokotsa,et al. Classification of RFID Attacks , 2008, IWRT.
[12] L. Reindl,et al. Wireless measurement of temperature using surface acoustic waves sensors , 2004, IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control.
[13] Vivek Subramanian,et al. Progress Toward Development of All-Printed RFID Tags: Materials, Processes, and Devices , 2005, Proceedings of the IEEE.
[14] Roy Want,et al. An introduction to RFID technology , 2006, IEEE Pervasive Computing.