Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[2] Dong Hoon Lee,et al. Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.
[3] Kevin Curran,et al. Tamper Detection for low cost RFID Tags: Using Watermarking with Chaotic Mapping , 2011 .
[4] Morshed U. Chowdhury,et al. Mutual authentication with malware protection for a RFID system , 2010, ICIT 2010.
[5] V. Potdar,et al. Tamper Detection in RFID Tags using Fragile Watermarking , 2006, 2006 IEEE International Conference on Industrial Technology.
[6] Jemal H. Abawajy. Enhancing RFID Tag Resistance against Cloning Attack , 2009, 2009 Third International Conference on Network and System Security.
[7] V. Potdar,et al. Recovering and Restoring Tampered RFID Data using Steganographic Principles , 2006, 2006 IEEE International Conference on Industrial Technology.
[8] Kevin Curran,et al. A Watermarking Based Tamper Detection Solution for RFID Tags , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[9] J. Mitsugi,et al. A Tamper Detection Method for RFID Tag Data , 2008, 2008 IEEE International Conference on RFID.
[10] Maurizio Rebaudengo,et al. Tampering in RFID: A Survey on Risks and Defenses , 2010, Mob. Networks Appl..
[11] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.