Guidelines for Securing Radio Frequency Identification (RFID) Systems | NIST
暂无分享,去创建一个
Bernard Eydt | Greg Barber | Lynn Bunn | Ted Phillips | Tom T. Karygiannis | T. Karygiannis | B. Eydt | G. Barber | Lynn Bunn | T. Phillips
[1] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[2] Avishai Wool,et al. How to Build a Low-Cost, Extended-Range RFID Skimmer , 2006, USENIX Security Symposium.
[3] Andrew S. Tanenbaum,et al. Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[4] Vincent Rijmen,et al. AES implementation on a grain of sand , 2005 .
[5] Rick Huhn,et al. Security Standards for the RFID Market , 2005, IEEE Secur. Priv..
[6] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[7] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[8] Joan Hash,et al. Building an Information Technology Security Awareness and Training Program , 2003 .
[9] Klaus Finkenzeller,et al. Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.
[10] R. Cleveland,et al. Questions and Answers about Biological Effects and Potential Hazards of Radiofrequency Electromagnetic Fields , 1999 .
[11] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.