Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
暂无分享,去创建一个
[1] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[2] D. McCullagh. RFID tags : Big Brother in small pachkages , 2003 .
[3] Steve H. Weingart. Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.
[4] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[5] Josef Pieprzyk,et al. Keyed Hash Functions , 1995, Cryptography: Policy and Algorithms.
[6] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[7] Ran Canetti,et al. Perfectly one-way probabilistic hash functions (preliminary version) , 1998, STOC '98.
[8] Daniel W. Engels,et al. Radio Frequency Identification and the Electronic Product Code , 2001, IEEE Micro.
[9] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[10] Daniel W. Engels,et al. I. Radio-Frequency Identification: Security Risks and Challenges , 2003 .
[11] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[12] Ran Canetti,et al. Perfectly One-Way Probabilistic Hash Functions , 1998, Symposium on the Theory of Computing.
[13] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.