RFID tags: privacy and security aspects
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[2] Hassan Aljifri,et al. Security model for Intra-Domain Mobility Management Protocol , 2004, Int. J. Mob. Commun..
[3] Tibor Gyires,et al. M-commerce security: the impact of wireless application protocol (WAP) security services on e-business and e-health solutions , 2003, Int. J. Mob. Commun..
[4] Keng Siau,et al. Mobile communications and mobile services , 2003, Int. J. Mob. Commun..
[5] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[6] Steve H. Weingart. Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.
[7] R. E. Bobbett,et al. Short range passive telemetry by modulated backscatter of incident cw rf carrier beam. [Remote temperature measurements in cattle] , 1976 .
[8] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[9] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[10] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[11] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[12] Björn Johansson,et al. An Introduction to RFID - Information Security and Privacy Concerns , 2004 .
[13] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[14] Christian Floerkemeier,et al. Issues with RFID Usage in Ubiquitous Computing Applications , 2004, Pervasive.
[15] Samtani Anil,et al. Overcoming barriers to the successful adoption of mobile commerce in Singapore , 2003, Int. J. Mob. Commun..
[16] Chang Liu,et al. Wireless trust: conceptual and operational definition , 2004, Int. J. Mob. Commun..
[17] Sozo Inoue,et al. RFID Privacy Using User-Controllable Uniqueness , 2003 .
[18] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[19] Klaus Finkenzeller,et al. Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.
[20] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.