Security Challenges for User-Oriented RFID Applications within the "Internet of Things"
暂无分享,去创建一个
Gerhard P. Hancke | Keith Mayes | Konstantinos Markantonakis | G. Hancke | K. Mayes | K. Markantonakis
[1] Gerhard P. Hancke,et al. Eavesdropping Attacks on High-Frequency RFID Tokens , 2008 .
[2] John Ayoade,et al. Roadmap to solving security and privacy concerns in RFID systems , 2007, Comput. Law Secur. Rev..
[3] Tsuyoshi Takagi,et al. An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.
[4] Collin Mulliner,et al. Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones , 2009, 2009 International Conference on Availability, Reliability and Security.
[5] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[6] A. Karygicmnis,et al. RFID Security: A Taxonomy of Risk , 2006, 2006 First International Conference on Communications and Networking in China.
[7] Andrew S. Tanenbaum,et al. Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[8] Andrew S. Tanenbaum,et al. The evolution of RFID security , 2006, IEEE Pervasive Computing.
[9] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[10] Rick Huhn,et al. Security Standards for the RFID Market , 2005, IEEE Secur. Priv..
[11] Pawel Rotter,et al. A Framework for Assessing RFID System Security and Privacy Risks , 2008, IEEE Pervasive Computing.
[12] Claudia Eckert. Sicherheit in der Informationstechnik , 2002 .
[13] George Roussos,et al. RFID Meets the Internet , 2009, IEEE Internet Computing.
[14] S TanenbaumAndrew,et al. Classifying RFID attacks and defenses , 2010 .