Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID
暂无分享,去创建一个
Xin Li | Chen Qian | Han Ding | Jinsong Han | Kui Ren | Ge Wang | Yuqin Yang | Jinsong Han | H. Ding | K. Ren | Xin Li | Chen Qian | Yuqin Yang | Ge Wang
[1] Mo Li,et al. Recitation: Rehearsing Wireless Packet Reception in Software , 2015, MobiCom.
[2] Tadayoshi Kohno,et al. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond , 2009, CCS.
[3] Srdjan Capkun,et al. On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem? , 2011, PETS.
[4] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[5] Zhenjiang Li,et al. aLeak: Privacy Leakage through Context - Free Wearable Side-Channel , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[6] Jizhong Zhao,et al. GenePrint: Generic and accurate physical-layer identification for UHF RFID tags , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[7] Jue Wang,et al. Dude, where's my card?: RFID positioning that works with multipath and non-line of sight , 2013, SIGCOMM.
[8] Yuanqing Zheng,et al. PLACE: Physical Layer Cardinality Estimation for Large-Scale RFID Systems , 2015, IEEE/ACM Transactions on Networking.
[9] Mo Li,et al. P-MTI: Physical-Layer Missing Tag Identification via Compressive Sensing , 2013, IEEE/ACM Transactions on Networking.
[10] Srdjan Capkun,et al. Physical-layer identification of UHF RFID tags , 2010, MobiCom.
[11] R. Haddad,et al. Multiresolution Signal Decomposition: Transforms, Subbands, and Wavelets , 1992 .
[12] Wei Xi,et al. Device-free detection of approach and departure behaviors using backscatter communication , 2016, UbiComp.
[13] Wei Xi,et al. Verifiable Smart Packaging with Passive RFID , 2016, IEEE Transactions on Mobile Computing.
[14] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[15] Lei Yang,et al. Analog On-Tag Hashing: Towards Selective Reading as Hash Primitives in Gen2 RFID Systems , 2017, MobiCom.
[16] Yunhao Liu,et al. STPP: Spatial-Temporal Phase Profiling-Based Method for Relative RFID Tag Localization , 2017, IEEE/ACM Transactions on Networking.
[17] Johannes Wolkerstorfer,et al. Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations , 2007, 2007 IEEE International Symposium on Circuits and Systems.
[18] Giorgio Franceschetti,et al. Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control , 2006 .
[19] Deepak Ganesan,et al. BLINK: a high throughput link layer for backscatter communication , 2012, MobiSys '12.
[20] Xi Chen,et al. Exploring the Gap between Ideal and Reality: An Experimental Study on Continuous Scanning with Mobile Reader in RFID Systems , 2015, IEEE Transactions on Mobile Computing.
[21] Ali N. Akansu,et al. Chapter 2 – Orthogonal Transforms , 1992 .
[22] Sanglu Lu,et al. Multi-Touch in the Air: Concurrent Micromovement Recognition Using RF Signals , 2018, IEEE/ACM Transactions on Networking.
[23] Jizhong Zhao,et al. Replay-resilient Physical-layer Authentication for Battery-free IoT Devices , 2017, HotWireless '17.
[24] Yunhao Liu,et al. LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[25] Jia Di,et al. Fingerprinting RFID Tags , 2011, IEEE Transactions on Dependable and Secure Computing.
[26] Christof Paar,et al. New Light-Weight Crypto Algorithms for RFID , 2007, 2007 IEEE International Symposium on Circuits and Systems.