메뉴 건너뛰기




Volumn , Issue , 2004, Pages 210-219

Privacy and security in library RFID issues, practices, and architectures

Author keywords

Privacy; Private Authentication; RFID; Security

Indexed keywords

ALGORITHMS; COMPUTER ARCHITECTURE; CRYPTOGRAPHY; LIBRARIES; LOGIC GATES; NETWORK PROTOCOLS; RANDOM PROCESSES; SECURITY OF DATA;

EID: 14844294769     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (613)

References (30)
  • 1
    • 14844304198 scopus 로고    scopus 로고
    • January
    • 3M. eTattler newsletter, January 2004. http://cms.3m.com/cms/US/en/0-257/ kkruuFX/viewimage.jhtml.
    • (2004) 3M. eTattler Newsletter
  • 6
    • 14844335916 scopus 로고    scopus 로고
    • EPCGlobal Consortium. EPC 900Mhz tag Class 0 standard, 2004. http://www.epcglobalinc.org/standards_technology/Secure/v1.0/UHF-class%.pdf.
    • (2004) EPC 900Mhz Tag Class 0 Standard
  • 8
    • 14844288215 scopus 로고    scopus 로고
    • December
    • FBI Counterterrorism Division. FBI intelligence memo no. 102, December 2002. http://cryptome.quintessenz.org/mirror/fbi-almanacs.htm.
    • (2002) FBI Intelligence Memo No. 102 , vol.102
  • 10
    • 14844282690 scopus 로고    scopus 로고
    • Phillips Electronics. ICode SLI data sheet, 2004. http://www. semiconductors.philips.com/acrobat/other/identification/s12i%cs20-fact-sheet. pdf.
    • (2004) ICode SLI Data Sheet
  • 12
    • 14844290165 scopus 로고    scopus 로고
    • Enhancing RFID privacy through antenna energy analysis
    • Kenneth Fishkin and Sumit Roy. Enhancing RFID privacy through antenna energy analysis. In MIT RFID Privacy Workshop, 2003. http://www.rfidprivacy.org/ papers/fishkin.pdf.
    • (2003) MIT RFID Privacy Workshop
    • Fishkin, K.1    Roy, S.2
  • 13
    • 33644642764 scopus 로고    scopus 로고
    • Adapting fair information practices to low cost RFID systems
    • Simson Garfinkel. Adapting fair information practices to low cost RFID systems. In Privacy in Ubiquitous Computing Workshop, 2002. http://www.simson. net/clips/academic/2000_Ubicomp_RFID.pdf.
    • (2002) Privacy in Ubiquitous Computing Workshop
    • Garfinkel, S.1
  • 14
    • 14844301449 scopus 로고    scopus 로고
    • Personal communication
    • Craig Gentry and Zulfikar Ramzan. Personal communication, 2004.
    • (2004)
    • Gentry, C.1    Ramzan, Z.2
  • 17
    • 33144466214 scopus 로고    scopus 로고
    • RFID privacy using user-controllable uniqueness
    • Sozo Inoue and Hiroto Yasuura. RFID privacy using user-controllable uniqueness. In RFID Privacy Workshop, MIT, 2003. http://www.rfidprivacy.org/ papers/sozo_inoue.pdf.
    • (2003) RFID Privacy Workshop, MIT
    • Inoue, S.1    Yasuura, H.2
  • 23
    • 14844310902 scopus 로고    scopus 로고
    • Berkeley Public Library. Best practices for library RFID, 2004. http://berkeleypubliclibrary.org/BESTPRAC.pdf.
    • (2004) Best Practices for Library RFID
  • 24
    • 0000793139 scopus 로고
    • Cramming more components onto integrated circuits
    • April
    • Gordon E. Moore. Cramming more components onto integrated circuits. Electronics, 38(8), April 1965.
    • (1965) Electronics , vol.38 , Issue.8
    • Moore, G.E.1
  • 26
    • 14844301577 scopus 로고    scopus 로고
    • Personal communication
    • Zulfikar Ramzan. Personal communication, 2004.
    • (2004)
    • Ramzan, Z.1
  • 27
    • 14844335601 scopus 로고    scopus 로고
    • Physics of RFID
    • Mark Reynolds. Physics of RFID. In MIT RFID Privacy Workshop, 2003. http://www.rfidprivacy.org/papers/physicsofrfid.ppt.
    • (2003) MIT RFID Privacy Workshop
    • Reynolds, M.1
  • 28
    • 14844336785 scopus 로고    scopus 로고
    • Checkpoint Systems. ILS exit sensor data sheet, 2004. http://www.checkpointsystems.com/docs/ILSSENSOR.pdf.
    • (2004) ILS Exit Sensor Data Sheet
  • 30
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Security in Pervasive Computing
    • Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Computing, volume 2802 of Lecture Notes in Computer Science, pages 201-212, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.