Internet of Things and RFID Security Issues and Countermeasures Featuring the Biometric e-Passport: An Introductory Exploratory Research
暂无分享,去创建一个
[1] Paul A. Karger,et al. Security and Privacy Issues in Machine Readable Travel Documents (MRTDs) , 2005 .
[2] Jochen Schiller,et al. Location Based Services , 2004 .
[3] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[4] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[5] Chris Roberts,et al. Biometric attack vectors and defences , 2007, Comput. Secur..
[6] Leilani Battle,et al. Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.
[7] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[8] Paul Müller,et al. Tackling Security and Privacy Issues in Radio Frequency Identification Devices , 2004, Pervasive.
[9] Rajveer Kaur,et al. Various Attacks and their Countermeasure on all Layers of RFID System , 2013 .
[10] Chris J. Mitchell,et al. RFID authentication protocol for low-cost tags , 2008, WiSec '08.
[11] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[12] Balaji Srinivasan,et al. Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics , 2012 .
[13] Hartmut Pohl,et al. RFID security , 2004, Inf. Secur. Tech. Rep..
[14] Hanifa Shah,et al. RFID Applications: An Introductory and Exploratory Study , 2010, ArXiv.
[15] Juan E. Tapiador,et al. RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.
[16] Balaji Srinivasan,et al. Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net , 2012 .
[17] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.
[18] Mahdi R. Alaghband,et al. Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard , 2011, ArXiv.
[19] Leonid Bolotnyy,et al. Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[20] Rob Kitchin,et al. Software, Objects, and Home Space , 2009 .
[21] Graham Clarke,et al. Some socio-technical aspects of intelligent buildings and pervasive computing research , 2009 .
[22] Huaxiong Wang,et al. Security Analysis of Australian and E.U. E-passport Implementation , 2008, J. Res. Pract. Inf. Technol..
[23] Huaxiong Wang,et al. Formal Security Analysis of Australian E-passport Implementation , 2008, AISC.
[24] David J. Warner. A Call to Action: The Fourth Amendment, The Future of Radio Frequency Identification, and Society , 2007 .
[25] Jennifer E. Smith. You Can Run, But You Can't Hide: Protecting Privacy from Radio Frequency Identification Technology , 2007 .
[26] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[27] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[28] Jean-Jacques Quisquater,et al. ePassport: Securing International Contacts with Contactless Chips , 2008, Financial Cryptography.
[29] Rishab Nithyanand. A Survey on the Evolution of Cryptographic Protocols in ePassports , 2009, IACR Cryptol. ePrint Arch..
[30] Pavol Zavarsky,et al. An analysis of security weaknesses in the evolution of RFID enabled passport , 2012, World Congress on Internet Security (WorldCIS-2012).
[31] Aikaterini Mitrokotsa,et al. Security Primitive Classification of RFID Attacks , 2011 .
[32] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[33] Julio C. Hernandez-Castro,et al. Attacking RFID Systems , 2010 .
[34] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[35] Paweł Rotter. Security and Privacy in RFID Applications , 2009 .
[36] Jürgen Bohn. Prototypical implementation of location-aware services based on a middleware architecture for super-distributed RFID tag infrastructures , 2006, Personal and Ubiquitous Computing.
[37] Eric W. T. Ngai,et al. Managing RFID projects in organizations , 2009, Eur. J. Inf. Syst..
[38] Martin Drahanský,et al. Anatomy of Biometric Passports , 2012, Journal of biomedicine & biotechnology.
[39] Atsushi Kanai,et al. Privacy Enhanced Active RFID Tag , 2005 .
[40] Deborah E. Popper,et al. Traceability: Tracking and Privacy in the Food System* , 2007 .
[41] David A. Wagner,et al. Privacy for RFID through trusted computing , 2005, WPES '05.
[42] Pablo Najera,et al. Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents , 2009, J. Univers. Comput. Sci..