RFID Based Security
暂无分享,去创建一个
[1] Marc Langheinrich. RFID and Privacy , 2007, Security, Privacy, and Trust in Modern Data Management.
[2] Andrew S. Tanenbaum,et al. The evolution of RFID security , 2006, IEEE Pervasive Computing.
[3] Yunhao Liu,et al. Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[4] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[5] Tadayoshi Kohno,et al. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond , 2009, CCS.
[6] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.
[7] Aikaterini Mitrokotsa,et al. Classification of RFID Attacks , 2008, IWRT.
[8] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[9] Andrew S. Tanenbaum,et al. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.
[10] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.
[11] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[12] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[13] Andrew S. Tanenbaum,et al. Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).