Securing RFID Applications: Issues, Methods, and Controls
暂无分享,去创建一个
[1] Klaus Finkenzeller,et al. RFID Handbook: Radio-Frequency Identification Fundamentals and Applications , 2000 .
[2] Shaun Doyle,et al. Software review: Auto-ID technology in retail and its potential application in marketing , 2004 .
[3] J. Patrick Ravenel. Effective Operational Security Metrics , 2006, Inf. Secur. J. A Glob. Perspect..
[4] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[5] Andrew S. Tanenbaum,et al. Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[6] Keith Alexander,et al. Applying Auto-ID to Reduce Losses Associated with Shrink ibm business consulting services , 2003 .
[7] J. Patrick Ravenel. Effective Operational Security Metrics , 2006 .
[8] Matthias Schumann,et al. RFID – Radio Frequency Identification , 2008, Informatik-Spektrum.