A Framework for Assessing RFID System Security and Privacy Risks
暂无分享,去创建一个
[1] Avishai Wool,et al. How to Build a Low-Cost, Extended-Range RFID Skimmer , 2006, USENIX Security Symposium.
[2] Raktim Pal,et al. Auto-ID: managing anything, anywhere, anytime in the supply chain , 2005, CACM.
[3] Roy Want,et al. RFID Technology and Applications , 2006, IEEE Pervasive Computing.
[4] A. Juels,et al. The security implications of VeriChip cloning. , 2006, Journal of the American Medical Informatics Association : JAMIA.
[5] Günter Karjoth,et al. Disabling RFID tags with visible confirmation: clipped tags are silenced , 2005, WPES '05.
[6] Oliver Günther,et al. Security Analysis of the Object Name Service , 2005 .
[7] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[8] Bart Jacobs,et al. Crossing Borders: Security and Privacy Issues of the European e-Passport , 2006, IWSEC.
[9] Susan Hansche,et al. Official (ISC)2 Guide to the CISSP Exam , 2003 .
[10] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[11] Avishai Wool,et al. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[12] Gerhard P. Hancke,et al. A Practical Relay Attack on ISO 14443 Proximity Cards , 2005 .
[13] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[14] Andrew S. Tanenbaum,et al. Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[15] Pawel Rotter,et al. RFID implants: Opportunities and and challenges for identifying people , 2008, IEEE Technology and Society Magazine.
[16] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[17] Andrew S. Tanenbaum,et al. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.