Security Problems in an RFID System
暂无分享,去创建一个
Widad Ismail | Mohammad Ghulam Rahman | Mohammed I. Younis | Jing Huey Khor | M. G. Rahman | M. K. Sulaiman | W. Ismail | M. Younis | J. Khor | M. Sulaiman
[1] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[2] Chin-Ling Chen,et al. Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection , 2009, Eng. Appl. Artif. Intell..
[3] Aikaterini Mitrokotsa,et al. Classification of RFID Attacks , 2008, IWRT.
[4] Chao Yang,et al. A Research on Issues Related to RFID Security and Privacy , 2007, I3E.
[5] Tadayoshi Kohno,et al. EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond , 2008 .
[6] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[7] Hung-Yu Chien,et al. A Lightweight Authentication Protocol for Low-Cost RFID , 2010, J. Signal Process. Syst..
[8] Ari Juels,et al. Shoehorning Security into the EPC Tag Standard , 2006, SCN.
[9] Sang Ho Lee,et al. Security and Privacy on Authentication Protocol for Low-cost RFID , 2006, 2006 International Conference on Computational Intelligence and Security.
[10] Mike Burmester,et al. A Flyweight RFID Authentication Protocol , 2009, IACR Cryptol. ePrint Arch..
[11] Florian Michahelles,et al. Securing RFID Systems by Detecting Tag Cloning , 2009, Pervasive.
[12] Chris J. Mitchell,et al. RFID authentication protocol for low-cost tags , 2008, WiSec '08.
[13] Dong Hoon Lee,et al. Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems , 2009, Comput. Stand. Interfaces.
[14] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.