Privacy and Security Requirements for RFID Applications
暂无分享,去创建一个
[1] Iris A. Junglas,et al. RFID as a Disruptive Innovation , 2008, J. Theor. Appl. Electron. Commer. Res..
[2] Fan-Yun Pai,et al. Evaluating the business value of RFID: Evidence from five case studies , 2008 .
[3] Juan E. Tapiador,et al. Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard , 2009, Comput. Commun..
[4] Tony Yu-Ju Tu,et al. Identifying RFID-embedded objects in pervasive healthcare applications , 2009, Decis. Support Syst..
[5] Anming Zhang,et al. Evaluating competitiveness of air cargo express services , 2009 .
[6] Henry C. W. Lau,et al. A RFID case-based logistics resource management system for managing order-picking operations in warehouses , 2009, Expert Syst. Appl..
[7] John Ayoade,et al. Roadmap to solving security and privacy concerns in RFID systems , 2007, Comput. Law Secur. Rev..
[8] Joan García-Haro,et al. Tracking of Returnable Packaging and Transport Units with active RFID in the grocery supply chain , 2009, Comput. Ind..
[9] Gerhard P. Hancke,et al. Transport ticketing security and fraud controls , 2009, Inf. Secur. Tech. Rep..
[10] Xiao-dan Zhang,et al. The review of RFID applications in global postal and courier services , 2006 .
[11] Andrew S. Tanenbaum,et al. RFID malware: Design principles and examples , 2006, Pervasive Mob. Comput..
[12] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[13] Sung-Ho Kim,et al. IPAP: Improved privacy and authentication protocol for passive RFID tags , 2010, 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content.
[14] J. Landt,et al. The history of RFID , 2005, IEEE Potentials.
[15] Soo-Young Kang,et al. A study on secure RFID mutual authentication scheme in pervasive computing environment , 2008, Comput. Commun..
[16] Bart Jacobs,et al. Crossing Borders: Security and Privacy Issues of the European e-Passport , 2006, IWSEC.
[17] May Tajima. Strategic value of RFID in supply chain management , 2007 .
[18] Yu-Cheng Lin,et al. Dynamic mobile RFID-based supply chain control and management system in construction , 2007, Adv. Eng. Informatics.
[19] T. C. Edwin Cheng,et al. Mobile commerce integrated with RFID technology in a container depot , 2007, Decis. Support Syst..
[20] Alex X. Liu,et al. PAP: A privacy and authentication protocol for passive RFID tags , 2009, Comput. Commun..
[21] Brian King,et al. Security Requirements for RFID Computing Systems , 2008, Int. J. Netw. Secur..
[22] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[23] Matthew Stibbe. Flight paths to security , 2005 .
[24] Hsiao-Cheng Yu,et al. Challenges to Global RFID Adoption , 2006 .
[25] Yang Xiao,et al. Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..
[26] Ronald E. Rice,et al. Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology , 2009, Int. J. Medical Informatics.
[27] Monideepa Tarafdar,et al. Classification of RFID adoption: An expected benefits approach , 2009, Inf. Manag..
[28] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[29] Hung-Min Sun,et al. Improvement of a novel mutual authentication scheme based on quadratic residues for RFID systems , 2008, 2009 Joint Conferences on Pervasive Computing (JCPC).
[30] Tianjie Cao,et al. Cryptanalysis of Two RFID Authentication Protocols , 2009, Int. J. Netw. Secur..