A Novel Coding Scheme for Secure Communications in Distributed RFID Systems
暂无分享,去创建一个
[1] Danilo De Donno,et al. Challenge: towards distributed RFID sensing with software-defined radio , 2010, MobiCom.
[2] Philip Levis,et al. Practical, real-time, full duplex wireless , 2011, MobiCom.
[3] Anish Arora,et al. Capabilities of Low-Power Wireless Jammers , 2009, IEEE INFOCOM 2009.
[4] Tieyan Li,et al. Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[5] Byeong-Hee Roh,et al. Backward Channel Protection Based on Randomized Tree-Walking Algorithm and Its Analysis for Securing RFID Tag Information and Privacy , 2008, IEICE Trans. Commun..
[6] Yingjiu Li,et al. Protecting RFID communications in supply chains , 2007, ASIACCS '07.
[7] Jaideep Srivastava,et al. Tag-Splitting: Adaptive Collision Arbitration Protocols for RFID Tag Identification , 2007, IEEE Transactions on Parallel and Distributed Systems.
[8] Sheikh Iqbal Ahamed,et al. AnonPri: An efficient anonymous private authentication protocol , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[9] Kazuya Sakai,et al. Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel , 2013, IEEE Transactions on Computers.
[10] Bryan Parno,et al. Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.
[11] W. B. Lee,et al. Design of a RFID case-based resource management system for warehouse operations , 2005, Expert Syst. Appl..
[12] J. B. Wilker. An extremum problem for hypercubes , 1996 .
[13] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[14] Tadayoshi Kohno,et al. RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications , 2008, CCS.
[15] Lifeng Sang,et al. Designing Physical Primitives For Secure Communication In Wireless Sensor Networks , 2010 .
[16] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[17] Anish Arora,et al. A shared-secret free security infrastructure for wireless networks , 2012, TAAS.
[18] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[19] Helmut Knebl,et al. Introduction to Cryptography , 2002, Information Security and Cryptography.
[20] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[21] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.