RFID Keeper: An RFID Data Access Control Mechanism
暂无分享,去创建一个
[1] John Capetanakis,et al. Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.
[2] Harald Vogt,et al. Multiple object identification with passive RFID tags , 2002, IEEE International Conference on Systems, Man and Cybernetics.
[3] David C. Yen,et al. Taxonomy and survey of RFID anti-collision protocols , 2006, Comput. Commun..
[4] M. Jacomet,et al. Contactless Identification Device With Anticollision Algorithm , 1999 .
[5] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[6] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[7] Harald Vogt,et al. Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.
[8] Kai-Yeung Siu,et al. MIT-AUTOID-TR-003 Ecient Memoryless Protocol for Tag Identication , 2000 .
[9] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[10] D. R. Hush,et al. Analysis of tree algorithms for RFID arbitration , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[11] Andrew S. Tanenbaum,et al. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags , 2005, Security Protocols Workshop.