Securing RFID with Ultra-wideband Modulation
暂无分享,去创建一个
[1] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[2] Dong Ha,et al. Low power CMOS re-programmable pulse generator for UWB systems , 2003, IEEE Conference on Ultra Wideband Systems and Technologies, 2003.
[3] Martin Fischer,et al. Fully integrated passive UHF RFID transponder IC with 16.7-μW minimum RF input power , 2003, IEEE J. Solid State Circuits.
[4] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[5] Klaus Finkenzeller,et al. RFID Handbook: Radio-Frequency Identification Fundamentals and Applications , 2000 .
[6] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[7] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[8] Jeffrey H. Reed,et al. Introduction to ultra wideband communication systems, an , 2005 .
[9] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[10] Avishai Wool,et al. How to Build a Low-Cost, Extended-Range RFID Skimmer , 2006, USENIX Security Symposium.
[11] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[12] Christoph Ruland,et al. Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags , 2006, CARDIS.