Banknote Validation through an Embedded RFID Chip and an NFC-Enabled Smartphone
暂无分享,去创建一个
[1] Yu-Jung Huang,et al. Efficient Implementation of RFID Mutual Authentication Protocol , 2012, IEEE Transactions on Industrial Electronics.
[2] Chi Fai Cheung,et al. Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication , 2010, Comput. Ind..
[3] Florian Michahelles,et al. Trust and Security in RFID-Based Product Authentication Systems , 2007, IEEE Systems Journal.
[4] M. Waldrop,et al. Science 2.0. , 2008, Scientific American.
[5] Sasa Radomirovic,et al. Security of an RFID Protocol for Supply Chains , 2008, 2008 IEEE International Conference on e-Business Engineering.
[6] Gerhard P. Hancke,et al. Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones , 2010, RFIDSec.
[7] Stefanos Gritzalis,et al. Security analysis of the song-mitchell authentication protocol for low-cost RFID tags , 2009, IEEE Communications Letters.
[8] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[9] Gary Andrechak,et al. Hitachi -chip RFID Technology Compatible with Gamma Sterilization , 2008 .
[10] Tim Hornyak,et al. RFID powder. , 2008, Scientific American.
[11] Muhammad Khurram Khan,et al. One-Time Password System with Infinite Nested Hash Chains , 2010, FGIT-SecTech/DRBC.
[12] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[13] Muhammad Khurram Khan,et al. Detecting counterfeit-money using RFID-enabled mobile devices , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[14] Mikhail Nesterenko,et al. RFID security without extensive cryptography , 2005, SASN '05.
[15] Robert H. Deng,et al. Attacks and improvements to an RIFD mutual authentication protocol and its extensions , 2009, WiSec '09.
[16] Kwangjo Kim,et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .
[17] István Vajda,et al. Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .
[18] Rodrigo Roman,et al. Real-time location and inpatient care systems based on passive RFID , 2010, Journal of Network and Computer Applications.
[19] 狄奥多·G·帕拉斯科瓦克斯. System and method for intelligent currency validation , 2006 .
[20] Chris J. Mitchell,et al. RFID authentication protocol for low-cost tags , 2008, WiSec '08.
[21] Yu-Jung Huang,et al. Hardware Implementation of RFID Mutual Authentication Protocol , 2010, IEEE Transactions on Industrial Electronics.
[22] Ching-Nung Yang,et al. Enhancing Privacy and Security in RFID-Enabled Banknotes , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[23] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[24] Chin-Ling Chen,et al. Anti-counterfeit ownership transfer protocol for low cost RFID system , 2008 .
[25] Dijiang Huang,et al. Towards Lightweight Secure Communication Protocols for Passive RFIDs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[26] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[27] KimTai-Hoon,et al. Mobile one-time passwords: two-factor authentication using mobile phones , 2012 .
[28] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[29] Hassan M. Elkamchouchi,et al. Mobile one-time passwords: two-factor authentication using mobile phones , 2012, Secur. Commun. Networks.