暂无分享,去创建一个
[1] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[2] Robert E. Wolfe,et al. An Algorithm to Produce Temporally and Spatially Continuous MODIS-LAI Time Series , 2008, IEEE Geoscience and Remote Sensing Letters.
[3] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[4] Andrew S. Tanenbaum,et al. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.
[5] Alex S. Taylor,et al. Visible and controllable RFID tags , 2010, CHI EA '10.
[6] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[7] Ya-ling Zhang,et al. An Authentication Protocol for RFID Tag and Its Simulation , 2011, J. Networks.
[8] Bruno Crispo,et al. RFID Guardian Back-end Security Protocol , 2008 .
[9] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[10] Gerhard P. Hancke. Practical attacks on proximity identification systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[11] Min-Shiang Hwang,et al. Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection , 2006 .
[12] Aikaterini Mitrokotsa,et al. Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.
[13] Ian R. Kerr. The Internet of People? Reflections on the Future Regulation of Human-Implantable Radio Frequency Identification , 2013 .
[14] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[15] B. Vollmer. Biometrics, RFID Technology, and the ePassport: Are Americans Risking Personal Security in the Face of Terrorism? , 2006 .
[16] Tina Quach,et al. Radio Frequency Integrated Circuits (RFIC) Symposium , 2005, Radio Frequency Integrated Circuits Symposium.
[17] Shlomi Dolev,et al. Low Overhead RFID Security , 2007 .
[18] Julio C. Hernandez-Castro,et al. Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks , 2009 .
[19] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[20] Deirdre K. Mulligan,et al. Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond , 2007, J. Commun..
[21] Klaus Finkenzeller,et al. Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .
[22] Bing Liang. Security and Performance Analysis for RFID Protocols , 2010 .
[23] J. W. Yum,et al. Smart card with an integrated electrical switch for secure operation , 2010, 2010 International Workshop on Antenna Technology (iWAT).
[24] Mohd Rizal Mohd Isa,et al. Fingerprint Biometrics Authentication on Smart Card , 2009, 2009 Second International Conference on Computer and Electrical Engineering.
[25] M. Babaie,et al. Efficient Detecting of RFID Tag Cloning Attacks using Chaos Theory , 2010 .
[26] Klaus Finkenzeller,et al. Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.
[27] Chao Li,et al. A two-factor authentication design of fingerprint recognition system based on DSP and RF card , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).
[28] Yanjun Zuo. Survivable RFID Systems: Issues, Challenges, and Techniques , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[29] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[30] Monica Nogueira. Uses of RFID Technology in U.S. Identification Documents , 2009 .
[31] Shantanu Rao. A secure architecture for the use of RFID at home , 2007 .
[33] Surinder Mohan Bhaskar. Is RFID Technology Secure and Private , 2008 .
[34] Paweł Rotter. Security and Privacy in RFID Applications , 2009 .
[35] Avishai Wool,et al. RFID-based electronic voting: What could possibly go wrong? , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).
[36] Y.-C. Lee,et al. A New Ultralightweight RFID Protocol with Mutual Authentication , 2009, 2009 WASE International Conference on Information Engineering.
[37] Paul A. Moskowitz,et al. A Privacy-Enhancing Radio Frequency Identification Tag: Implementation of the Clipped Tag , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[38] Georgios Kambourakis,et al. A secure and efficient authentication protocol for passive RFID tags , 2009, 2009 6th International Symposium on Wireless Communication Systems.
[39] Torstein Haver,et al. Security and Privacy in RFID Applications , 2006 .
[40] Jill A Fisher,et al. Implanting inequality: Empirical evidence of social and ethical risks of implantable radio-frequency identification (RFID) devices , 2010, International Journal of Technology Assessment in Health Care.
[41] Frank Thornton,et al. RFID Security , 2005 .
[42] J.A. del Alamo,et al. An equivalent circuit model for a Faraday cage substrate crosstalk isolation structure , 2004, 2004 IEE Radio Frequency Integrated Circuits (RFIC) Systems. Digest of Papers.
[43] Marlin H. Mickle,et al. Intellectual Property and Ubiquitous RFID , 2008 .