Attacking RFID Systems
暂无分享,去创建一个
[1] Atsushi Kanai,et al. Privacy Enhanced Active RFID Tag , 2005 .
[2] Mark Weiser. The computer for the 21st century , 1991 .
[3] Tuomas Aura,et al. Strategies against replay attacks , 1997, Proceedings 10th Computer Security Foundations Workshop.
[4] Kevin Fu,et al. Privacy for Public Transportation , 2006, Privacy Enhancing Technologies.
[5] Kevin Fu,et al. Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.
[6] Avishai Wool,et al. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[7] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[8] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[9] Gerhard P. Hancke. Practical attacks on proximity identification systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[10] Marek Klonowski,et al. Privacy Protection in Dynamic Systems Based on RFID Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[11] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[12] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[13] István Vajda,et al. Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .
[14] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[15] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[16] D.C. Ranasinghe,et al. Confronting Security and Privacy Threats in Modern RFID Systems , 2006, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers.
[17] Frank Thornton,et al. RFID Security , 2005 .
[18] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[19] Günter Karjoth,et al. Disabling RFID tags with visible confirmation: clipped tags are silenced , 2005, WPES '05.
[20] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[21] Leonid Bolotnyy,et al. Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[22] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[23] Andrew S. Tanenbaum,et al. A Platform for RFID Security and Privacy Administration (Awarded Best Paper!) , 2006, LISA.
[24] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[25] Martin Hlavác,et al. A Note on the Relay Attacks on e-passports: The Case of Czech e-passports , 2007, IACR Cryptol. ePrint Arch..
[26] Andrew S. Tanenbaum,et al. Uniting Legislation with RFID Privacy-Enhancing Technologies , 2005 .
[27] Ari Juels,et al. RFID: security and privacy for five-cent wireless devices (abstract only) , 2004, WiSe '04.
[28] Ari Juels,et al. Soft blocking: flexible blocker tags on the cheap , 2004, WPES '04.
[29] Marit Hansen,et al. An analysis of security and privacy issues relating to RFID enabled ePassports , 2007, SEC.
[30] Steve H. Weingart. Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.
[31] Behnam Jamali,et al. RFID Tag Vulnerabilities in RFID Systems , 2008 .
[32] Damith C. Ranasinghe,et al. Networked RFID Systems and Lightweight Cryptography , 2008 .
[33] George Danezis,et al. How Much Is Location Privacy Worth? , 2005, WEIS.
[34] Jim Alves-Foss,et al. On Preventing Replay Attacks on Security Protocols , 2002 .
[35] Holger Ziekow,et al. RFID: A 7-Point Plan to Ensure Privacy , 2005, ECIS.
[36] Derek Atkins,et al. Threat Analysis of the Domain Name System (DNS) , 2004, RFC.
[37] Thomas Hjorth. Supporting Privacy in RFID Systems , 2004 .
[38] Juan E. Tapiador,et al. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.
[39] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[40] Katherine Albrecht,et al. Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID , 2005 .
[41] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[42] Bart Jacobs,et al. Crossing Borders: Security and Privacy Issues of the European e-Passport , 2006, IWSEC.