A secure architecture for the management of Radio Frequency Identification at home

[1]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[2]  Daniel W. Engels,et al.  On the Future of RFID Tags and Protocols , 2003 .

[3]  Wonjun Lee,et al.  An Adaptive Memoryless Protocol for RFID Tag Collision Arbitration , 2006, IEEE Transactions on Multimedia.

[4]  Jaideep Srivastava,et al.  Adaptive binary splitting for efficient RFID tag anti-collision , 2006, IEEE Communications Letters.

[5]  Andrew S. Tanenbaum,et al.  RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.

[6]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[7]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[8]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[9]  George Roussos,et al.  Enabling RFID in retail , 2006, Computer.

[10]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[11]  Min Chen,et al.  OPT: Optimal Protocol Tree for Efficient Tag Identification in Dense RFID Systems , 2006, 2006 IEEE International Conference on Communications.

[12]  Deborah Estrin,et al.  Next Century Challenges: Mobile Networking for Smart Dust , 1999, MobiCom 1999.

[13]  Ivan Stojmenovic,et al.  A hybrid randomized protocol for RFID tag identification , 2006 .

[14]  Rick Huhn,et al.  Security Standards for the RFID Market , 2005, IEEE Secur. Priv..

[15]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[16]  D. R. Hush,et al.  Analysis of tree algorithms for RFID arbitration , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[17]  Oliver Günther,et al.  Security Analysis of the Object Name Service , 2005 .

[18]  K.R. Foster,et al.  RFID Inside , 2007, IEEE Spectrum.

[19]  Philippe Oechslin,et al.  RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.