High-Power Proxies for Enhancing RFID Privacy and Utility
暂无分享,去创建一个
[1] Rattapoom Tuchinda. Security and Privacy in the Intelligent Room , 2002 .
[2] Ross Stapleton-Gray. Would Macy's Scan Gimbels? Competitive Intelligence and RFID , 2003 .
[3] Paul F. Syverson,et al. Protocols Using Anonymous Connections: Mobile Applications , 1997, Security Protocols Workshop.
[4] Ari Juels. Strengthening EPC tags against cloning , 2005, WiSe '05.
[5] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[6] Hannes Hartenstein,et al. Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers , 2005, ESAS.
[7] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[8] Tatsuaki Okamoto. Topics in Cryptology – CT-RSA 2004 , 2004, Lecture Notes in Computer Science.
[9] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[10] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[11] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.
[12] Marc Langheinrich,et al. Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols , 2004, UCS.
[13] Kazuo Takaragi,et al. An Ultra Small Individual Recognition Security Chip , 2001, IEEE Micro.
[14] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[15] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[16] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[17] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[18] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[19] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[20] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[21] D. McCullagh. RFID tags : Big Brother in small pachkages , 2003 .
[22] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[23] Ari Juels,et al. Soft blocking: flexible blocker tags on the cheap , 2004, WPES '04.
[24] Bing Jiang,et al. Some Methods for Privacy in RFID Communication , 2004, ESAS.
[25] Daniel W. Engels,et al. Radio Frequency Identification Systems , 2015 .
[26] David J. Goodman,et al. Personal Communications , 1994, Mobile Communications.