Study of Recent Development about Privacy and Security of the Internet of Things
暂无分享,去创建一个
[1] Xu Jin. Anti-collision Algorithm for RFID System , 2009 .
[2] Joongheon Kim,et al. Weighted Localized Clustering: A Coverage-Aware Reader Collision Arbitration Protocol in RFID Networks , 2005, ICESS.
[3] Yunhao Liu,et al. Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[4] Jong Hyuk Park,et al. Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers , 2009, 2009 International Conference on Computational Science and Engineering.
[5] Chae-Woo Lee,et al. AN ENHANCED COLORWAVE READER ANTI-COLLISION ALGORITHM IN RFID SYSTEM , 2006 .
[6] Joongheon Kim,et al. Effect of localized optimal clustering for reader anti-collision in RFID networks: fairness aspects to the readers , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..
[7] Máire O'Neill,et al. Low-cost digital signature architecture suitable for radio frequency identification tags , 2010, IET Comput. Digit. Tech..
[8] Ming-Hour Yang,et al. Authentication Protocol in Mobile RFID Network , 2009, 2009 Fourth International Conference on Systems.
[9] Rasool Jalili,et al. AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[10] Benjamin C. M. Fung,et al. Preserving RFID data privacy , 2009, 2009 IEEE International Conference on RFID.
[11] Vladimir Oleshchuk,et al. Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.
[12] Yuping Zhao,et al. A Novel Solution to the Reader Collision Problem in RFID System , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[13] Srijith Krishnan Nair,et al. Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.
[14] Qiaoling Tong,et al. Dynamic Framed Slotted ALOHA Algorithm Based on Bayesian Estimation in RFID System , 2009, 2009 WRI World Congress on Computer Science and Information Engineering.
[15] Jeong Hyun Yi,et al. A study of mobile proxy for privacy enhancement , 2010, 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE).
[16] G. Pujolle,et al. HIP-based RFID Networking Architecture , 2007, 2007 IFIP International Conference on Wireless and Optical Communications Networks.
[17] Pascal Urien,et al. HIP-tags architecture implementation for the Internet of things , 2009, 2009 First Asian Himalayas International Conference on Internet.
[18] Lee Su-Ryun,et al. An Enhanced Colorwave Reader Anti-collision Algorithm in RFID System , 2006 .
[19] Kaixing Wu,et al. A New Energy-Aware Scheme for RFID System Based on ALOHA , 2010, 2010 Second International Conference on Future Networks.
[20] Daniel W. Engels,et al. I. Radio-Frequency Identification: Security Risks and Challenges , 2003 .
[21] Daniel W. Engels,et al. HiQ: a hierarchical Q-learning algorithm to solve the reader collision problem , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).
[22] Weiming Wu,et al. Mutual authentication protocol based on tag ID number updating for low-cost RFID , 2009, 2009 IEEE International Conference on Network Infrastructure and Digital Content.
[23] C. Pepin,et al. HIP-tags, a new paradigm for the Internet Of Things , 2008, 2008 1st IFIP Wireless Days.
[24] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[25] Mostafa Salah,et al. Parallel binary tree splitting protocol for tag anti-collision in RFID systems , 2009, 2009 4th International Design and Test Workshop (IDT).
[26] Y.-C. Lee,et al. A New Ultralightweight RFID Protocol with Mutual Authentication , 2009, 2009 WASE International Conference on Information Engineering.
[27] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[28] Boris Sokolov,et al. New concept of RFID reader networks structure: hardware and software architecture , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.
[29] Yuan-Cheng Lai,et al. General binary tree protocol for coping with the capture effect in RFID tag identification , 2010, IEEE Communications Letters.
[30] InChan Song,et al. An Improved Reader Anti-Collision Algorithm Based on Pulse Protocol with Slot Occupied Probability in Dense Reader Mode , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[31] Cagatay Karabat. A Novel Secure RFID System to Ensure Privacy , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[32] Doo Seop Eom,et al. DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers , 2006, EUC Workshops.
[33] Daniel W. Engels,et al. Colorwave: an anticollision algorithm for the reader collision problem , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[34] Sridhar Iyer,et al. PULSE: A MAC Protocol for RFID Networks , 2005, EUC Workshops.
[35] Frank Yeong-Sung Lin,et al. A Simulated Annealing Algorithm for RFID Reader Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[36] Sarah Spiekermann,et al. Critical RFID Privacy-Enhancing Technologies , 2009, IEEE Security & Privacy.