EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond
暂无分享,去创建一个
[1] Andrew S. Tanenbaum,et al. A Platform for RFID Security and Privacy Administration (Awarded Best Paper!) , 2006, LISA.
[2] A. Juels,et al. The Security Implications of VeriChip Cloning , 2006 .
[3] Jennifer King,et al. Where's The Beep? Security, Privacy, and User Misunderstandings of RFID , 2008, UPSEC.
[4] R. Nickerson. Confirmation Bias: A Ubiquitous Phenomenon in Many Guises , 1998 .
[5] Marco Gruteser,et al. A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks , 2003, SPC.
[6] M. Allen,et al. A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns , 2000, Health education & behavior : the official publication of the Society for Public Health Education.
[7] Eugene Borgida,et al. The Differential Impact of Abstract vs. Concrete Information on Decisions , 1977 .
[8] Ari Juels. Strengthening EPC tags against cloning , 2005, WiSe '05.
[9] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[10] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[11] N D Weinstein,et al. Perceived probability, perceived severity, and health-protective behavior. , 2000, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.
[12] David Evans,et al. Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.
[13] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[14] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[15] Alanson P. Sample,et al. A Wirelessly-Powered Platform for Sensing and Computation , 2006, UbiComp.
[16] Mani Mina,et al. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.
[17] Steven J. Sherman,et al. Social explanation: The role of timing, set, and recall on subjective likelihood estimates. , 1983 .
[18] Flavio D. Garcia,et al. Wirelessly Pickpocketing a Mifare Classic Card , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[19] Kevin Fu,et al. Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.
[20] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[21] Ari Juels,et al. Technology Evaluation: The Security Implications of VeriChip Cloning , 2006, J. Am. Medical Informatics Assoc..
[22] Kathleen L. Mosier,et al. Does automation bias decision-making? , 1999, Int. J. Hum. Comput. Stud..
[23] Raja Parasuraman,et al. The role of memory representation in the vigilance decrement , 2004, Psychonomic bulletin & review.
[24] Tadayoshi Kohno,et al. Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing , 2007, USENIX Security Symposium.
[25] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[26] Tadayoshi Kohno,et al. EPC RFID Tags in Security Applications: Passport Cards, Enhanced Drivers Licenses, and Beyond , 2008 .
[27] S. Breznitz. Cry Wolf: The Psychology of False Alarms , 1984 .