Attacking RFID Systems

[1]  Atsushi Kanai,et al.  Privacy Enhanced Active RFID Tag , 2005 .

[2]  Mark Weiser The computer for the 21st century , 1991 .

[3]  Tuomas Aura,et al.  Strategies against replay attacks , 1997, Proceedings 10th Computer Security Foundations Workshop.

[4]  Kevin Fu,et al.  Privacy for Public Transportation , 2006, Privacy Enhancing Technologies.

[5]  Kevin Fu,et al.  Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.

[6]  Avishai Wool,et al.  Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[7]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[8]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[9]  Gerhard P. Hancke Practical attacks on proximity identification systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[10]  Marek Klonowski,et al.  Privacy Protection in Dynamic Systems Based on RFID Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[11]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[12]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[13]  István Vajda,et al.  Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .

[14]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[15]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[16]  D.C. Ranasinghe,et al.  Confronting Security and Privacy Threats in Modern RFID Systems , 2006, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers.

[17]  Frank Thornton,et al.  RFID Security , 2005 .

[18]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[19]  Günter Karjoth,et al.  Disabling RFID tags with visible confirmation: clipped tags are silenced , 2005, WPES '05.

[20]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[21]  Leonid Bolotnyy,et al.  Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[22]  Paul Syverson,et al.  A Taxonomy of Replay Attacks , 1994 .

[23]  Andrew S. Tanenbaum,et al.  A Platform for RFID Security and Privacy Administration (Awarded Best Paper!) , 2006, LISA.

[24]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[25]  Martin Hlavác,et al.  A Note on the Relay Attacks on e-passports: The Case of Czech e-passports , 2007, IACR Cryptol. ePrint Arch..

[26]  Andrew S. Tanenbaum,et al.  Uniting Legislation with RFID Privacy-Enhancing Technologies , 2005 .

[27]  Ari Juels,et al.  RFID: security and privacy for five-cent wireless devices (abstract only) , 2004, WiSe '04.

[28]  Ari Juels,et al.  Soft blocking: flexible blocker tags on the cheap , 2004, WPES '04.

[29]  Marit Hansen,et al.  An analysis of security and privacy issues relating to RFID enabled ePassports , 2007, SEC.

[30]  Steve H. Weingart Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.

[31]  Behnam Jamali,et al.  RFID Tag Vulnerabilities in RFID Systems , 2008 .

[32]  Damith C. Ranasinghe,et al.  Networked RFID Systems and Lightweight Cryptography , 2008 .

[33]  George Danezis,et al.  How Much Is Location Privacy Worth? , 2005, WEIS.

[34]  Jim Alves-Foss,et al.  On Preventing Replay Attacks on Security Protocols , 2002 .

[35]  Holger Ziekow,et al.  RFID: A 7-Point Plan to Ensure Privacy , 2005, ECIS.

[36]  Derek Atkins,et al.  Threat Analysis of the Domain Name System (DNS) , 2004, RFC.

[37]  Thomas Hjorth Supporting Privacy in RFID Systems , 2004 .

[38]  Juan E. Tapiador,et al.  M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.

[39]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[40]  Katherine Albrecht,et al.  Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID , 2005 .

[41]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[42]  Bart Jacobs,et al.  Crossing Borders: Security and Privacy Issues of the European e-Passport , 2006, IWSEC.