A survey of RFID privacy approaches
暂无分享,去创建一个
[1] Ari Juels,et al. Soft blocking: flexible blocker tags on the cheap , 2004, WPES '04.
[2] C. Castelluccia,et al. Secret Shuffling: A Novel Approach to RFID Private Identification , 2007 .
[3] Andrew S. Tanenbaum,et al. The evolution of RFID security , 2006, IEEE Pervasive Computing.
[4] Ari Juels,et al. RFID PRIVACY : A TECHNICAL PRIMER FOR THE NON-TECHNICAL READER , 2005 .
[5] David J. Danelski,et al. Privacy and Freedom , 1968 .
[6] Sozo Inoue,et al. RFID Privacy Using User-Controllable Uniqueness , 2003 .
[7] Günter Karjoth,et al. Disabling RFID tags with visible confirmation: clipped tags are silenced , 2005, WPES '05.
[8] Yunhao Liu,et al. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.
[9] Andrew S. Tanenbaum,et al. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags , 2005, Security Protocols Workshop.
[10] Sarah Spiekermann,et al. Maintaining Privacy in RFID Enabled Environments , 2005 .
[11] Marc Langheinrich. RFID and Privacy , 2007, Security, Privacy, and Trust in Modern Data Management.
[12] Sarah Spiekermann,et al. Maintaining Privacy in Rfid Enabled Environments - Proposal for a Disable-Model , 2005 .
[13] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[14] Milan Petkovic,et al. Security, Privacy, and Trust in Modern Data Management , 2007, Data-Centric Systems and Applications.
[15] Tassos Dimitriou,et al. A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[16] Simson L. Garfinkel,et al. RFID: Applications, Security, and Privacy , 2005 .
[17] KobsaAlfred,et al. Privacy through pseudonymity in user-adaptive systems , 2003 .
[18] Bryan Parno,et al. Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.
[19] Katherine J. Strandburg,et al. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation , 2005 .
[20] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[21] Andrew S. Tanenbaum,et al. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.
[22] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[23] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[24] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[25] Oliver Günther,et al. RFID: Verbraucherängste und verbraucherschutz , 2005, Wirtsch..
[26] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[27] 坂倉 省吾,et al. Technology Review : 抄録雑誌の概要 , 1987 .
[28] Marc Langheinrich,et al. Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols , 2004, UCS.
[29] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[30] Gene Tsudik. A Family of Dunces: Trivial RFID Identification and Authentication Protocols , 2007, Privacy Enhancing Technologies.
[31] Sarah Spiekermann,et al. RFID and privacy: what consumers really want and fear , 2009, Personal and Ubiquitous Computing.
[32] Levente Buttyán,et al. Optimal Key-Trees for Tree-Based Private Authentication , 2006, Privacy Enhancing Technologies.
[33] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[34] Philippe Oechslin,et al. Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.
[35] Marc Langheinrich,et al. Practical Minimalist Cryptography for RFID Privacy , 2007, IEEE Systems Journal.
[36] Tim Kerins,et al. An Elliptic Curve Processor Suitable For RFID-Tags , 2006, IACR Cryptol. ePrint Arch..
[37] Alfred Kobsa,et al. Privacy through pseudonymity in user-adaptive systems , 2003, TOIT.
[38] Frédéric Thiesse,et al. Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.
[39] David A. Wagner,et al. Privacy for RFID through trusted computing , 2005, WPES '05.
[40] Tsuyoshi Takagi,et al. An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.
[41] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[42] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[43] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[44] Roy Want,et al. An introduction to RFID technology , 2006, IEEE Pervasive Computing.
[45] Bing Jiang,et al. Some Methods for Privacy in RFID Communication , 2004, ESAS.
[46] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[47] Oliver Günther,et al. Security Analysis of the Object Name Service , 2005 .
[48] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[49] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[50] Dan Suciu,et al. Physical Access Control for Captured RFID Data , 2007, IEEE Pervasive Computing.
[51] Mikhail Nesterenko,et al. RFID security without extensive cryptography , 2005, SASN '05.
[52] Adi Shamir,et al. How to share a secret , 1979, CACM.
[53] Kevin Fu,et al. Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.
[54] Hannes Hartenstein,et al. Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers , 2005, ESAS.
[55] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.