Design Trade-Offs for Realistic Privacy
暂无分享,去创建一个
[1] David Evans,et al. Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper) , 2006, ICICS.
[2] Ari Juels,et al. RFID: security and privacy for five-cent wireless devices (abstract only) , 2004, WiSe '04.
[3] Andrew M. Odlyzko,et al. Privacy, economics, and price discrimination on the Internet , 2003, ICEC '03.
[4] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[5] Frédéric Thiesse,et al. Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.
[6] Andrew S. Tanenbaum,et al. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.
[7] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[8] Ari Juels,et al. Defining Strong Privacy for RFID , 2007, PerCom Workshops.
[9] Levente Buttyán,et al. Optimal Key-Trees for Tree-Based Private Authentication , 2006, Privacy Enhancing Technologies.
[10] Ted Taekyoung Kwon,et al. Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer , 2006, ICICS.
[11] Philippe Oechslin,et al. RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.
[12] Benjamin Fabian,et al. Emerging Markets for RFID Traces , 2006, ArXiv.
[13] Sozo Inoue,et al. Quantitative evaluation of unlinkable ID matching schemes , 2005, WPES '05.
[14] Jia Zhai,et al. Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure , 2006, ICCSA.
[15] Ivan Damgård,et al. RFID Security: Tradeoffs between Security and Efficiency , 2008, CT-RSA.
[16] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[17] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[18] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.