Research and confirmation of an anti-counterfeiting approach for product authentication based on documentation enhancement
暂无分享,去创建一个
[1] Elgar Fleisch,et al. Serialized TID numbers - A headache or a blessing for RFID crackers? , 2009, 2009 IEEE International Conference on RFID.
[2] Manuel Blum,et al. A Secure Human-Computer Authentication Scheme , 2000 .
[3] Chi Fai Cheung,et al. A counterfeit network analyzer based on RFID and EPC , 2010, Ind. Manag. Data Syst..
[4] Florian Michahelles,et al. Securing RFID Systems by Detecting Tag Cloning , 2009, Pervasive.
[5] Aikaterini Mitrokotsa,et al. Classification of RFID Attacks , 2008, IWRT.
[6] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[7] T. Staake,et al. The emergence of counterfeit trade: a literature review , 2009 .
[8] Elgar Fleisch,et al. Product specific security features based on RFID technology , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).
[9] Horst Wildemann,et al. Plagiatschutz: Handlungsspielräume der produzierenden Industrie gegen Produktpiraterie , 2007 .
[10] Luke Mirowski,et al. A taxonomy of system attacker behavior reveals security vulnerabilities in RFID authorization and monitoring systems. , 2009 .