Towards Practical Identification of HF RFID Devices
暂无分享,去创建一个
[1] Darko Kirovski,et al. RF Fingerprinting Physical Objects for Anticounterfeiting Applications , 2011, IEEE Transactions on Microwave Theory and Techniques.
[2] Michael A. Temple,et al. Improved wireless security for GMSK-based devices using RF fingerprinting , 2010, Int. J. Electron. Secur. Digit. Forensics.
[3] Antonio Pascual Iserte. Channel state Information and joint transmitter-receiver design in multi-antenna systems , 2005 .
[4] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[5] Srinivas Devadas,et al. Identification and authentication of integrated circuits , 2004, Concurr. Pract. Exp..
[6] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.
[7] Sofiène Tahar,et al. IP watermarking techniques: survey and comparison , 2003, The 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications, 2003. Proceedings..
[8] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[9] Ravi Sandhu,et al. ACM Transactions on Information and System Security: Editorial , 2005 .
[10] W. Kinsner,et al. Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.
[11] Chih-Ming Wang,et al. Electromagnetic Measurements for Counterfeit Detection of Radio Frequency Identification Cards , 2009, IEEE Transactions on Microwave Theory and Techniques.
[12] N. Serinken,et al. Characteristics of radio transmitter fingerprints , 2001 .
[13] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[14] G. Szentirmai,et al. Electronic filter design handbook , 1982, Proceedings of the IEEE.
[15] Ralph D. Hippenstiel,et al. Wavelet Based Transmitter Identification , 1996, Fourth International Symposium on Signal Processing and Its Applications.
[16] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[17] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[18] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[19] CapkunSrdjan,et al. Towards Practical Identification of HF RFID Devices , 2012 .
[20] Jia Di,et al. Ownership Transfer of RFID Tags based on Electronic Fingerprint , 2008, Security and Management.
[21] Srdjan Capkun,et al. Physical-layer identification of UHF RFID tags , 2010, MobiCom.
[22] Michael A. Temple,et al. Improving Intra-Cellular Security Using Air Monitoring with RF Fingerprints , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[23] Srinivas Devadas,et al. Identification and authentication of integrated circuits: Research Articles , 2004 .
[24] Ebby. Ebby's Column. Ebby revisits. Q121-126 , 2006 .
[25] Michel Barbeau,et al. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.
[26] Farinaz Koushanfar,et al. Robust stable radiometric fingerprinting for wireless devices , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[27] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[28] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[29] O. Ureten,et al. Detection of radio transmitter turn-on transients , 1999 .
[30] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[31] K. Strimmer,et al. Statistical Applications in Genetics and Molecular Biology A Shrinkage Approach to Large-Scale Covariance Matrix Estimation and Implications for Functional Genomics , 2011 .
[32] Chih-Ming Wang,et al. Identifying RF Identification Cards From Measurements of Resonance and Carrier Harmonics , 2010, IEEE Transactions on Microwave Theory and Techniques.
[33] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[34] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[35] Jia Di,et al. Fingerprinting RFID Tags , 2011, IEEE Transactions on Dependable and Secure Computing.
[36] Dale R. Thompson,et al. Fingerprinting Radio Frequency Identification Tags Using Timing Characteristics , 2009 .
[37] B. Yener,et al. Active Attacks Against Modulation-based Radiometric Identification , 2009 .
[38] Darko Kirovski,et al. An RFID system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities , 2010, 2010 IEEE MTT-S International Microwave Symposium.
[39] Witold Kinsner,et al. Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.
[40] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[41] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[42] Jonathon Shlens,et al. A Tutorial on Principal Component Analysis , 2014, ArXiv.
[43] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[44] Darko Kirovski,et al. RF-DNA: Radio-Frequency Certificates of Authenticity , 2007, CHES.
[45] Christopher M. Bishop,et al. Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .