-
1
-
-
0038271926
-
Supermarket cards: the tip of the retail surveillance iceberg
-
Albrecht K. Supermarket cards: the tip of the retail surveillance iceberg. Denver University Law Review 79 (2002) 534-565. http://www.spychips.com/documents/Albrecht-Denver-Law.pdf
-
(2002)
Denver University Law Review
, vol.79
, pp. 534-565
-
-
Albrecht, K.1
-
3
-
-
26444443915
-
-
G. Avoine, P. Oechslin, A scalable and provably secure hash-based RFID protocol, in: Third IEEE International Conference on Pervasive Computing and Communications Workshops 2005, March, pp. 110-114.
-
-
-
-
4
-
-
34247545963
-
-
E. Batista. What your clothes say about you, Wired News http://www.wired.com, 2003. http://www.wired.com/news/wireless/0,1382,58006,00.html.
-
-
-
-
5
-
-
34247469172
-
-
Boycott Benetton, http://www.boycottbenetton.com.
-
-
-
-
6
-
-
34247483809
-
-
M. Burmester, T. van Le, B. de Medeiros, Provably secure ubiquitous systems: Universally composable RFID authentication protocols, 2006. Referenced 2006 at http://eprint.iacr.org/2006/131.pdf.
-
-
-
-
7
-
-
33746330954
-
Adaptive gossip protocols: managing security and redundancy in dense ad hoc networks
-
Burmester M., van Le T., and Yasinsac A. Adaptive gossip protocols: managing security and redundancy in dense ad hoc networks. Journal of Ad hoc Networks 4 3 (2006) 504-515
-
(2006)
Journal of Ad hoc Networks
, vol.4
, Issue.3
, pp. 504-515
-
-
Burmester, M.1
van Le, T.2
Yasinsac, A.3
-
8
-
-
34247538705
-
-
C.A.S.P.I.A.N. http://www.nocards.org.
-
-
-
-
9
-
-
34247498933
-
-
S.J. Engberg, M.B. Harning, C.D. Jensen, Zero-knowledge device authentication: privacy & security enhanced RFID preserving business value and consumer convenience, in: Second Annual Conference on Privacy, Security and Trust 2004. Referenced 2006 at http://www.obivision.com/Papers/PST2004_RFID_ed.pdf.
-
-
-
-
10
-
-
34247482932
-
-
C.C. Haley, Are you ready for RFID? Internetnews.com, November 2003. http://www.internetnews.com/wireless/article.php/3109501.
-
-
-
-
11
-
-
34247519936
-
-
J.E. Henning, Preserving privacy in RFID deployment, Technical Report RVS-Occ-04-01, RVS, Faculty of Technology, University of Bielefeld, March 2004.
-
-
-
-
13
-
-
34247508420
-
-
A. Juels, S.A. Weis, Defining strong privacy for RFID, 2006. http://www.rsasecurity.com/rsalabs/node.asp?id=3046, submitted for publication.
-
-
-
-
14
-
-
33749005411
-
-
Y. Nohara, S. Inoue, K. Baba, H. Yasuura, Quantitative evaluation of unlinkable ID matching schemes, in: Workshop on Privacy in the Electronic Society (WPES), 2005.
-
-
-
-
15
-
-
34247503527
-
-
M. Ohkubo, K. Suzuki, S. Kinoshita, Efficient hash-chain based RFID privacy protection scheme, in: International Conference on Obiquitous Computing - Ubicomp, Workshop Privacy, Current Status and Future Directions, 2004.
-
-
-
-
16
-
-
34247548166
-
-
Boycott Tesco, http://news.zdnet.co.uk/0,39020330,39185481,00.htm.
-
-
-
-
17
-
-
33750290259
-
-
G. Tsudik, YA-TRAP. yet another trivial RFID authentication protocol, in: PerCom Workshops 2006, IEEE Computer Society, Pisa, Italy, 2006, pp. 640-643.
-
-
-
-
18
-
-
35048876270
-
-
S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, Security and privacy aspects of low-cost radio frequency identification systems, in: Security in Pervasive Computing, vol. 2802 of Lecture Notes in Computer Science 2004, pp. 201-212.
-
-
-
|