RFID Traceability: A Multilayer Problem
暂无分享,去创建一个
[1] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[2] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[3] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[4] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[5] Gildas Avoine,et al. Privacy Issues in RFID Banknote Protection Schemes , 2004, CARDIS.
[6] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[7] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[8] Jaecheol Ryou,et al. Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags , 2004, EUC.
[9] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[10] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[11] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[12] S.A. Weis. RFID privacy workshop , 2004, IEEE Security & Privacy Magazine.
[13] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[14] Witold Kinsner,et al. Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.
[15] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.