Review: Security Threats for RFID-Sensor Network Anti-Collision Protocol
暂无分享,去创建一个
[1] Cheng-Hao Quan,et al. The Slotted-LBT: A RFID Reader Medium Access Scheme in Dense Reader Environments , 2008, 2008 IEEE International Conference on RFID.
[2] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[3] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[4] Yanghee Choi,et al. SARIF: A novel framework for integrating wireless sensor and RFID networks , 2007, IEEE Wireless Communications.
[5] Alex Biryukov,et al. Recent attacks on alleged SecurID and their practical implications , 2005, Comput. Secur..
[6] D C Robbins,et al. A bill of rights. , 1989, Diabetes care.
[7] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[8] Xiao Fan,et al. Enhanced Pulse Protocol RFID Reader Anti-collision Algorithm using Slot Occupied Probability in Dense Reader Environment , 2008, KSII Trans. Internet Inf. Syst..
[9] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[10] Daniel W. Engels,et al. Colorwave: a MAC for RFID reader networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[11] R. Bansal,et al. Antenna theory; analysis and design , 1984, Proceedings of the IEEE.
[12] Dong Hoon Lee,et al. Efficient RFID Authentication Protocol for Ubiquitous Computing Environment , 2005, EUC Workshops.
[13] S. Iyer,et al. Mitigating the reader collision problem in RFID networks with mobile readers , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.
[14] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[15] Junius K. Ho,et al. Solving the reader collision problem with a hierarchical Q-learning algorithm , 2003 .
[16] Oliver Günther,et al. RFID and the Perception of Control: The Consumer's View , 2005, IEEE Engineering Management Review.
[17] Ari Juels,et al. Soft blocking: flexible blocker tags on the cheap , 2004, WPES '04.
[18] Joongheon Kim,et al. Optimized transmission power control of interrogators for collision arbitration in UHF RFID systems , 2007, IEEE Communications Letters.
[19] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.
[20] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[21] P. Nikitin,et al. Antenna design for UHF RFID tags: a review and a practical application , 2005, IEEE Transactions on Antennas and Propagation.
[22] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[23] Lei Zhang,et al. Integration of RFID into Wireless Sensor Networks: Architectures, Opportunities and Challenging Problems , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.