Evaluating and Improving the Security of RFID Tags in Shipping Containers
暂无分享,去创建一个
[1] Constantine A. Balanis,et al. Antenna Theory: Analysis and Design , 1982 .
[2] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[3] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[4] Christian Floerkemeier,et al. Issues with RFID Usage in Ubiquitous Computing Applications , 2004, Pervasive.
[5] István Vajda,et al. Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .
[6] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[7] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[8] Masahiko Takenaka,et al. Secure Active RFID Tag System , 2005 .
[9] Juan E. Tapiador,et al. RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.
[10] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[11] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[12] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[13] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[14] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[15] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.
[16] Ari Juels,et al. Soft blocking: flexible blocker tags on the cheap , 2004, WPES '04.
[17] Atsushi Kanai,et al. Privacy Enhanced Active RFID Tag , 2005 .
[18] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.