Localization Privacy
暂无分享,去创建一个
[1] A. S. Krishnakumar,et al. Bayesian indoor positioning systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[2] Stanisław Lem. His Master's Voice , 1968 .
[3] Miklós Maróti,et al. Radio interferometric geolocation , 2005, SenSys '05.
[4] Xiuwen Liu,et al. Accurate localization of RFID tags using phase difference , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).
[5] Yunhao Liu,et al. VIRE: Active RFID-based Localization Using Virtual Reference Elimination , 2007, 2007 International Conference on Parallel Processing (ICPP 2007).
[6] Jan Camenisch,et al. Untraceable RFID tags via insubvertible encryption , 2005, CCS '05.
[7] S. Coco,et al. A novel 2-D ray tracing procedure for the localization of EM field sources in urban environment , 2004, IEEE Transactions on Magnetics.
[8] Wolfram Burgard,et al. Modeling RFID signal strength and tag detection for localization and mapping , 2009, 2009 IEEE International Conference on Robotics and Automation.
[9] Tassos Dimitriou,et al. A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[10] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[11] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[12] S.A. Weis. RFID privacy workshop , 2004, IEEE Security & Privacy Magazine.
[13] P.V. Nikitin,et al. An Overview of Near Field UHF RFID , 2007, 2007 IEEE International Conference on RFID.
[14] Mike Burmester. His Late Master's Voice: Barking for Location Privacy , 2011, Security Protocols Workshop.
[15] Mauro Brunato,et al. Statistical learning theory for location fingerprinting in wireless LANs , 2005, Comput. Networks.
[16] Ingrid Verbauwhede,et al. Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware , 2010, Towards Hardware-Intrinsic Security.
[17] Yunhao Liu,et al. LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[18] Polly Huang,et al. Spinning beacons for precise indoor localization , 2008, SenSys '08.
[19] Zhang Xiong,et al. An Improved RFID-Based Locating Algorithm by Eliminating Diversity of Active Tags for Indoor Environment , 2009, Comput. J..
[20] George Danezis,et al. How Much Is Location Privacy Worth? , 2005, WEIS.
[21] Mike Burmester,et al. Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols , 2006, 2006 Securecomm and Workshops.
[22] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[23] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[24] Cesare Alippi,et al. A statistical approach to localize passive RFIDs , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[25] Brian W. Kernighan,et al. WISE design of indoor wireless systems: practical computation and optimization , 1995 .
[26] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[27] A. Kleiner,et al. Mapping disaster areas jointly: RFID-Coordinated SLAM by Hurnans and Robots , 2007, 2007 IEEE International Workshop on Safety, Security and Rescue Robotics.
[28] Ling Liu,et al. From Data Privacy to Location Privacy: Models and Algorithms , 2007, VLDB.
[29] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[30] Mike Burmester,et al. The Security of EPC Gen2 Compliant RFID Protocols , 2008, ACNS.
[31] Bruno Sinopoli,et al. A kernel-based learning approach to ad hoc sensor network localization , 2005, TOSN.
[32] Peter Volgyesi,et al. Towards Precise Indoor RF Localization , 2008 .
[33] Ákos Lédeczi,et al. Radio interferometric tracking of mobile wireless nodes , 2007, MobiSys '07.
[34] Jing Shi,et al. RFID localization algorithms and applications—a review , 2009, J. Intell. Manuf..
[35] R. Weigel,et al. Ultra low power oscillator for UHF RFID transponder , 2008, 2008 IEEE International Frequency Control Symposium.
[36] Kaoru Kurosawa,et al. OMAC: One-Key CBC MAC , 2003, IACR Cryptol. ePrint Arch..
[37] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[38] Binghao Li,et al. Use of Directional Information in Wireless LAN based indoor positioning , 2007 .
[39] Andrew G. Dempster,et al. Direction-based Wireless LAN Positioning , 2007 .
[40] Xenofon D. Koutsoukos,et al. Using RF received phase for indoor tracking , 2010, HotEmNets.
[41] James Poirot,et al. Navigation by Back Triangulation , 1976, IEEE Transactions on Aerospace and Electronic Systems.
[42] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[43] Wolfram Burgard,et al. Mapping and localization with RFID technology , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.
[44] Gergely V. Záruba,et al. A Bayesian sampling approach to in-door localization of wireless devices using received signal strength indication , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[45] Xenofon D. Koutsoukos,et al. Tracking mobile nodes using RF Doppler shifts , 2007, SenSys '07.
[46] Abdelhamid Tayebi,et al. THE APPLICATION OF RAY-TRACING TO MOBILE LOCALIZATION USING THE DIRECTION OF ARRIVAL AND RECEIVED SIGNAL STRENGTH IN MULTIPATH INDOOR ENVIRONMENTS , 2009 .
[47] Moustafa Youssef,et al. The Horus WLAN location determination system , 2005, MobiSys '05.
[48] Mike Burmester,et al. Universally composable and forward-secure RFID authentication and authenticated key exchange , 2007, ASIACCS '07.
[49] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.