-
2
-
-
34547749367
-
Data architectures for RFID transactions
-
Aug
-
S. Chalasani and R. Boppana, "Data architectures for RFID transactions," IEEE Trans. Ind. Informal., vol. 3, no. 3, pp. 246-257, Aug. 2007.
-
(2007)
IEEE Trans. Ind. Informal
, vol.3
, Issue.3
, pp. 246-257
-
-
Chalasani, S.1
Boppana, R.2
-
3
-
-
35649004923
-
Product life-cycle metadata modeling and its application with RDF
-
Dec
-
H.-B. Jun, D. Kiritsis, and P. Xirouchakis, "Product life-cycle metadata modeling and its application with RDF," IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1680-1693, Dec. 2007.
-
(2007)
IEEE Trans. Knowl. Data Eng
, vol.19
, Issue.12
, pp. 1680-1693
-
-
Jun, H.-B.1
Kiritsis, D.2
Xirouchakis, P.3
-
5
-
-
45849133238
-
-
Massachusetts Institute of Technology, Cambridge, MA, Tech. Rep
-
D. W. Engels and S. E. Sarma, Standardization Requirements Within the RFID Class Structure Framework, Auto-ID Labs, Massachusetts Institute of Technology, Cambridge, MA, 2005, Tech. Rep.
-
(2005)
Standardization Requirements Within the RFID Class Structure Framework, Auto-ID Labs
-
-
Engels, D.W.1
Sarma, S.E.2
-
7
-
-
34249859365
-
Modular wireless real-time sensor/actuator network for factory automation applications
-
May
-
H.-J. Korber, H. Wattar, and G. Scholl, "Modular wireless real-time sensor/actuator network for factory automation applications," IEEE Trans. Ind. Informat, vol. 3, no. 2, pp. 111-119, May 2007.
-
(2007)
IEEE Trans. Ind. Informat
, vol.3
, Issue.2
, pp. 111-119
-
-
Korber, H.-J.1
Wattar, H.2
Scholl, G.3
-
9
-
-
59049107842
-
-
Kraftfahrt-Bundesamt, Online, Available: Available
-
Kraftfahrt-Bundesamt, Statistische Mitteilungen-Fahrzeugzulassungen, 2007. [Online]. Available: Available: http://www.kbashop.de/wcsstore/KBA/ Attachrnent/Kostenlose-Produkte/b-hersteller-2007.pdf.
-
(2007)
Statistische Mitteilungen-Fahrzeugzulassungen
-
-
-
10
-
-
33747304628
-
Is your cat infected with a computer virus?
-
M. R. Rieback, B. Crispo, and A. S. Tanenbaum, "Is your cat infected with a computer virus?," Pervas. Comput. Commun., pp. 169-179, 2006.
-
(2006)
Pervas. Comput. Commun
, pp. 169-179
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
12
-
-
51349151701
-
-
J. O. Lauf and H. Sauff, IEEE, Nice, France, Secure lightweight tunnel for monitoring transport containers, in Proc. 3rd Int. Conf Security and Privacy in Communication Networks-Secure Comm 2007, Sep. 2007, IEEE Computer Society Press.
-
J. O. Lauf and H. Sauff, IEEE, Nice, France, "Secure lightweight tunnel for monitoring transport containers," in Proc. 3rd Int. Conf Security and Privacy in Communication Networks-Secure Comm 2007, Sep. 2007, IEEE Computer Society Press.
-
-
-
-
13
-
-
34548165071
-
A security framework in RFID multi-domain system
-
IEEE Computer Society
-
D. S. Kim, T.-H. Shin, and J. S. Park, "A security framework in RFID multi-domain system," in Proc. 2nd Int. Conf Availability, Reliability and Security (ARES'07), 2007, pp. 1227-1234, IEEE Computer Society.
-
(2007)
Proc. 2nd Int. Conf Availability, Reliability and Security (ARES'07)
, pp. 1227-1234
-
-
Kim, D.S.1
Shin, T.-H.2
Park, J.S.3
-
14
-
-
41549100271
-
-
EPCglobal Inc, The EPCglobal Network:, Tech. Rep
-
EPCglobal Inc., The EPCglobal Network: Overview of Design, Benefits, & Security, 2004, Tech. Rep.
-
(2004)
Overview of Design, Benefits, & Security
-
-
-
15
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Berkeley, CA, USENIX Assoc
-
J. G. Steiner, B. C. Neuman, and J. I. Schiller, "Kerberos: An authentication service for open network systems," in Proc. USENIX Winter 1988 Technical Conf., Berkeley, CA, 1988, pp. 191-202, USENIX Assoc.
-
(1988)
Proc. USENIX Winter 1988 Technical Conf
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
-
16
-
-
31844447562
-
Secure transfer of measurement data in open systems
-
N. Z. L. Lo Iacono and C. Ruland, "Secure transfer of measurement data in open systems," Comput. Stand. Interf.: Valid. Softw. Metrol., vol. 28, no. 3, pp. 311-326, 2006.
-
(2006)
Comput. Stand. Interf.: Valid. Softw. Metrol
, vol.28
, Issue.3
, pp. 311-326
-
-
Lo Iacono, N.Z.L.1
Ruland, C.2
-
17
-
-
17744367088
-
Real-time energy management over power-lines and internet
-
A. Treytl, T. Sauter, and G. Bumille, "Real-time energy management over power-lines and internet," in Proc. Int. Symp. Power-Line Communications and its Applications, 2004, pp. 306-311.
-
(2004)
Proc. Int. Symp. Power-Line Communications and its Applications
, pp. 306-311
-
-
Treytl, A.1
Sauter, T.2
Bumille, G.3
-
18
-
-
47849125697
-
Security in agent-based automation systems
-
B. A. Khan, J. Mad, and A. Treytl, "Security in agent-based automation systems," in Proc. IEEE Conf. Emerging Technologies & Factory Automation, 2007, pp. 768-771.
-
(2007)
Proc. IEEE Conf. Emerging Technologies & Factory Automation
, pp. 768-771
-
-
Khan, B.A.1
Mad, J.2
Treytl, A.3
-
19
-
-
23944476196
-
-
A. Juels, Minimalist cryptography for low-cost RFID tags, in Proc. Int. Conf Security in Communication Networks-SCN 2004, C. Blundo and S. Cimato, Eds., Amalfi, Italy, Sep. 2004, 3352, Lecture Notes in Computer Science, pp. 149-164, Springer-Verlag.
-
A. Juels, "Minimalist cryptography for low-cost RFID tags," in Proc. Int. Conf Security in Communication Networks-SCN 2004, C. Blundo and S. Cimato, Eds., Amalfi, Italy, Sep. 2004, vol. 3352, Lecture Notes in Computer Science, pp. 149-164, Springer-Verlag.
-
-
-
-
20
-
-
59049092145
-
-
M. Ohkubo, K. Suzuki, and S. Kinoshita, MIT, Cambridge, MA, Cryptographic approach to privacy-friendly tags, in Proc. RFID Privacy Workshop, Nov. 2003.
-
M. Ohkubo, K. Suzuki, and S. Kinoshita, MIT, Cambridge, MA, "Cryptographic approach to "privacy-friendly" tags," in Proc. RFID Privacy Workshop, Nov. 2003.
-
-
-
-
21
-
-
26444443915
-
A scalable and provably secure hash based RFID protocol
-
Kauai Island, HI, Mar, IEEE Computer Society Press
-
G. Avoine and P. Oechslin, "A scalable and provably secure hash based RFID protocol," in Proc. IEEE Int. Workshop Pervasive Computing and Communication Security-PerSec 2005, Kauai Island, HI, Mar. 2005, pp. 110-114, IEEE Computer Society Press.
-
(2005)
Proc. IEEE Int. Workshop Pervasive Computing and Communication Security-PerSec 2005
, pp. 110-114
-
-
Avoine, G.1
Oechslin, P.2
-
22
-
-
33750290259
-
-
G. Tsudik, IEEE, Pisa, Italy, YA-TRAP: Yet another trivial RFID authentication protocol, in Proc. Int. Conf. Pervasive Computing and Communications-PerCom 2006, Mar. 2006, IEEE Computer Society Press.
-
G. Tsudik, IEEE, Pisa, Italy, "YA-TRAP: Yet another trivial RFID authentication protocol," in Proc. Int. Conf. Pervasive Computing and Communications-PerCom 2006, Mar. 2006, IEEE Computer Society Press.
-
-
-
-
23
-
-
33749406338
-
Scalable and untraceable authentication protocol for RFID
-
Proc. Int. Workshop Security in Ubiquitous Computing Systems-Secubiq 2006, Seoul, Korea, Aug, Springer-Verlag
-
Y. Seo and K. Kim, "Scalable and untraceable authentication protocol for RFID," in Proc. Int. Workshop Security in Ubiquitous Computing Systems-Secubiq 2006, Seoul, Korea, Aug. 2006, Lecture Notes in Computer Science, Springer-Verlag.
-
(2006)
Lecture Notes in Computer Science
-
-
Seo, Y.1
Kim, K.2
-
24
-
-
1842815892
-
An introduction to access security in UMTS
-
Feb
-
G. M. Koien, "An introduction to access security in UMTS," IEEE Wireless Commun., vol. 11, no. 1, pp. 8-18, Feb. 2004.
-
(2004)
IEEE Wireless Commun
, vol.11
, Issue.1
, pp. 8-18
-
-
Koien, G.M.1
-
25
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
L. Gong, R. Needham, and R. Yahalom, "Reasoning about belief in cryptographic protocols," in Proc. IEEE 1990 Symp. Security and Privacy, 1990, pp. 234-248.
-
(1990)
Proc. IEEE 1990 Symp. Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
26
-
-
59049105285
-
-
M. Henseler, Credential Management für heterogene RFID-Lösungen in Logistik-Anwendungen (Credential management for hetrogenous RFID solutions in logistic appliances) Master's thesis, Technische Univ. Ilmenau, Ilmenau Thur, Germany, Feb. 2008. [Online]. Available: http://www.tu-ilmenau.de/fakia/Diplomarbeiten.676.0.html.
-
M. Henseler, "Credential Management für heterogene RFID-Lösungen in Logistik-Anwendungen (Credential management for hetrogenous RFID solutions in logistic appliances)" Master's thesis, Technische Univ. Ilmenau, Ilmenau Thur, Germany, Feb. 2008. [Online]. Available: http://www.tu-ilmenau.de/fakia/Diplomarbeiten.676.0.html.
-
-
-
-
27
-
-
59049087248
-
-
J. Viega and D. McGrew, The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP), RFC 4106 (Proposed Standard), 2005. [Online]. Available: http://www.ietf.org/rfc/rfc4106. txt.
-
J. Viega and D. McGrew, The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP), RFC 4106 (Proposed Standard), 2005. [Online]. Available: http://www.ietf.org/rfc/rfc4106. txt.
-
-
-
-
28
-
-
0242577995
-
MPEG-21: Goals and Achievements
-
I. Burnett, R. V. de Walle, K. Hill, J. Bormans, and F. Pereira, "MPEG-21: Goals and Achievements," IEEE Multi Media, vol. 10, no. 4, pp. 60-70, 2003.
-
(2003)
IEEE Multi Media
, vol.10
, Issue.4
, pp. 60-70
-
-
Burnett, I.1
de Walle, R.V.2
Hill, K.3
Bormans, J.4
Pereira, F.5
|