Implementation of terminal middleware platform for mobile RFID computing
暂无分享,去创建一个
[1] Simson L. Garfinkel,et al. RFID: Applications, Security, and Privacy , 2005 .
[2] Flavio D. Garcia,et al. Modeling Privacy for Off-Line RFID Systems , 2010, CARDIS.
[3] Kwangjo Kim,et al. Mobile RFID Applications and Security Challenges , 2006, ICISC.
[4] Jeeyeon Kim,et al. Privacy threats and issues in mobile RFID , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[5] Younghwa An,et al. RFID System for User's Privacy Protection , 2005, 2005 Asia-Pacific Conference on Communications.
[6] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[7] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[8] Ruay-Shiung Chang,et al. A Mobile Personalized RFID System , 2009, 2009 International Conference on Network-Based Information Systems.
[9] K. Wouters,et al. Practical Experiences with NFC Security on mobile Phones , 2009 .
[10] Dongho Won,et al. WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment , 2006, APWeb Workshops.
[11] Gildas Avoine,et al. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks , 2009, CANS.
[12] Florian Michahelles,et al. Securing RFID Systems by Detecting Tag Cloning , 2009, Pervasive.
[13] Dongho Won,et al. Security Analysis and Implementation Leveraging Globally Networked RFIDs , 2006, PWC.
[14] Myunghee Son,et al. Design and implementation of mobile RFID technology in the CDMA networks , 2006, 2006 8th International Conference Advanced Communication Technology.
[15] Hyoung Jun Kim,et al. RFID code structure and tag data structure for mobile RFID services in Korea , 2006, 2006 8th International Conference Advanced Communication Technology.
[16] Philippe Oechslin,et al. RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.
[17] Dongho Won,et al. RFID System with Fairness Within the Framework of Security and Privacy , 2005, ESAS.
[18] Katherine J. Strandburg,et al. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation , 2005 .
[19] Howon Kim,et al. The design of dynamic authorization model for user centric service in mobile environment , 2006, 2006 8th International Conference Advanced Communication Technology.