RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
暂无分享,去创建一个
Tadayoshi Kohno | Joshua R. Smith | Karl Koscher | Alexei Czeskis | Karl Koscher | Alexei Czeskis | Tadayoshi Kohno
[1] Daniel P. Siewiorek,et al. Activity-Based Computing , 2008, IEEE Pervasive Computing.
[2] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[3] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[4] Avishai Wool,et al. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[5] Kirsi Helkala,et al. Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..
[6] Eyal de Lara,et al. Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.
[7] Jennifer Healey,et al. A Long-Term Evaluation of Sensing Modalities for Activity Recognition , 2007, UbiComp.
[8] Gregory D. Abowd,et al. A gesture-based authentication scheme for untrusted public terminals , 2004, UIST '04.
[9] René Mayrhofer,et al. Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.
[10] Alanson P. Sample,et al. A Wirelessly-Powered Platform for Sensing and Computation , 2006, UbiComp.
[11] Gerhard P. Hancke,et al. A Practical Relay Attack on ISO 14443 Proximity Cards , 2005 .
[12] Steven J. Murdoch,et al. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.
[13] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[14] Ling Bao,et al. Activity Recognition from User-Annotated Acceleration Data , 2004, Pervasive.
[15] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[16] James A. Landay,et al. The Mobile Sensing Platform: An Embedded Activity Recognition System , 2008, IEEE Pervasive Computing.
[17] R.K. Guy,et al. On numbers and games , 1978, Proceedings of the IEEE.
[18] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[19] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[20] Kevin Fu,et al. Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.