Shoehorning Security into the EPC Tag Standard
暂无分享,去创建一个
[1] Paul F. Syverson,et al. High-Power Proxies for Enhancing RFID Privacy and Utility , 2005, Privacy Enhancing Technologies.
[2] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[3] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.
[4] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[5] Frédéric Thiesse,et al. Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.
[6] David A. Wagner,et al. Privacy for RFID through trusted computing , 2005, WPES '05.
[7] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[8] Ari Juels. Strengthening EPC tags against cloning , 2005, WiSe '05.
[9] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[10] István Vajda,et al. Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .
[11] Günter Karjoth,et al. Disabling RFID tags with visible confirmation: clipped tags are silenced , 2005, WPES '05.
[12] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .
[13] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[14] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[15] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[16] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[17] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[18] Bing Jiang,et al. Some Methods for Privacy in RFID Communication , 2004, ESAS.
[19] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[20] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[21] Philippe Oechslin,et al. Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.
[22] Andrew S. Tanenbaum,et al. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.
[23] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).