The Survey of RFID Attacks and Defenses
暂无分享,去创建一个
[1] Zhang Fan. A Universally Composable Secure RFID Communication Protocol in Supply Chains , 2008 .
[2] Bernard Eydt,et al. Guidelines for Securing Radio Frequency Identification (RFID) Systems | NIST , 2007 .
[3] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[4] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[5] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[6] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[7] Kaan Yuksel,et al. Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications , 2004 .
[8] Bing Jiang,et al. Some Methods for Privacy in RFID Communication , 2004, ESAS.
[9] Hung-Yu Chien,et al. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.
[10] Y.-C. Lee,et al. An Improvement on RFID Authentication Protocol with Privacy Protection , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[11] Gildas Avoine,et al. Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols , 2010, RFIDSec.
[12] Dongho Won,et al. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.
[13] Li Jintao,et al. Research on Hash-Based RFID Security Authentication Protocol , 2009 .