-
1
-
-
25144488541
-
Shrouds of time - The history of RFID, Ver. 1.0
-
Pittsburgh: AIM Inc.
-
Landt J, Catlin B. Shrouds of Time-The history of RFID, Ver. 1.0 [R]. Pittsburgh: AIM Inc., 2001
-
(2001)
-
-
Landt, J.1
Catlin, B.2
-
2
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Berlin: Springer
-
Rhee K, Kwak J, Kim S, et al. Challenge-response based RFID authentication protocol for distributed database environment [C]//Proc of the 2nd Int Conf on Security in Pervasive Computing. Berlin: Springer, 2005: 70-84
-
(2005)
Proc of the 2nd Int Conf on Security in Pervasive Computing
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
-
5
-
-
33744964854
-
Design and analysis of cryptographic protocols for RFID
-
in Chinese
-
Zhou Yongbin, Feng Dengguo. Design and analysis of cryptographic protocols for RFID [J]. Chinese Journal of Computers, 2006, 29(4): 581-589 (in Chinese)
-
(2006)
Chinese Journal of Computers
, vol.29
, Issue.4
, pp. 581-589
-
-
Zhou, Y.1
Feng, D.2
-
8
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Berlin: Springer
-
Stajano F, Anderson R. The resurrecting duckling: Security issues for ad-hoc wireless networks [C]//Proc of the 7th Int Workshop on Security Protocols. Berlin: Springer, 1999: 172-194
-
(1999)
Proc of the 7th Int Workshop on Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
11
-
-
65349093752
-
Cryptographic approach to "Privacy-Friendly" tags
-
Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to "Privacy-Friendly" tags [OL]. [2007-10-07]. http://www.rfidprivacy.us/2003/papers/ohkubo.pdf
-
(2007)
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
12
-
-
52049088655
-
Mutual authentication of RFID system using synchronized secret information
-
Daejeon, Korea: School of Engineering, Information and Communications University
-
Lee S. Mutual authentication of RFID system using synchronized secret information [D]. Daejeon, Korea: School of Engineering, Information and Communications University, 2005
-
(2005)
-
-
Lee, S.1
-
15
-
-
33749663423
-
RFID malware: Design principles and examples
-
Rieback M R, Simpson P N D, Crispo B, et al. RFID malware: Design principles and examples [J]. Pervasive and Mobile Computing, 2006, 2(4): 405-426
-
(2006)
Pervasive and Mobile Computing
, vol.2
, Issue.4
, pp. 405-426
-
-
Rieback, M.R.1
Simpson, P.N.D.2
Crispo, B.3
-
16
-
-
65349174893
-
Cellphone could crack RFID tags, says cryptographer
-
Merritt R. Cellphone could crack RFID tags, says cryptographer [OL]. (2006-02-14) http://www.eetimes.com/news/latest/showArticle.jhtml? articleID=180201688
-
(2006)
-
-
Merritt, R.1
-
17
-
-
34548145421
-
RFID security issues in military supply chains
-
Los Alamitos, CA: IEEE Computer Society
-
Xiao Q, Boulet C, Gibbons T. RFID security issues in military supply chains [C]//Proc of 2nd Int Conf on Availability, Reliability and Security. Los Alamitos, CA: IEEE Computer Society, 2007: 599-605
-
(2007)
Proc of 2nd Int Conf on Availability, Reliability and Security
, pp. 599-605
-
-
Xiao, Q.1
Boulet, C.2
Gibbons, T.3
-
18
-
-
38049125926
-
LRMAP: Lightweight and resynchronous mutual authentication protocol for RFID system
-
Berlin: Springer
-
Ha J C, Ha J H, Moon S J, et al. LRMAP: Lightweight and resynchronous mutual authentication protocol for RFID system [C]//Proc of the Int Conf on Ubiquitous Convergence Technology. Berlin: Springer, 2007: 80-89
-
(2007)
Proc of the Int Conf on Ubiquitous Convergence Technology
, pp. 80-89
-
-
Ha, J.C.1
Ha, J.H.2
Moon, S.J.3
-
21
-
-
33745776359
-
Universal hashing for ultra-low-power cryptographic hardware applications
-
Worcester, MA: Department of Electronical Engineering, Worcester Polytechnic Institute
-
YÄuksel K. Universal hashing for ultra-low-power cryptographic hardware applications [D]. Worcester, MA: Department of Electronical Engineering, Worcester Polytechnic Institute, 2004
-
(2004)
-
-
YÄuksel, K.1
-
23
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Berlin: Springer
-
Weis S A, Sarma S E, Rivest R L, et al. Security and privacy aspects of low-cost radio frequency identification systems [C]//Proc of the 1st Security in Pervasive Computing. Berlin: Springer, 2003: 201-212
-
(2003)
Proc of the 1st Security in Pervasive Computing
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
-
24
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
Los Alamitos, CA: IEEE Computer Society
-
Henrici D, P Mauller. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers [C]//Proc of the 2nd IEEE Annual Conf on Pervasive Computing and Communications Workshops. Los Alamitos, CA: IEEE Computer Society, 2004
-
(2004)
Proc of the 2nd IEEE Annual Conf on Pervasive Computing and Communications Workshops
-
-
Henrici, D.1
Mauller, P.2
-
27
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Los Alamitos, CA: IEEE Computer Society
-
Molnar D, Wagner D. Privacy and security in library RFID: Issues, practices, and architectures [C]//Proc of the 11th ACM Conf on Computer and Communications Security. Los Alamitos, CA: IEEE Computer Society, 2004: 210-219
-
(2004)
Proc of the 11th ACM Conf on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
28
-
-
35248832722
-
Squealing euros: Privacy-protection in RFID-enabled banknotes
-
Berlin: Springer
-
Juels A, Pappu R. Squealing euros: Privacy-protection in RFID-enabled banknotes [C]//Proc of the Financial Cryptography. Berlin: Springer, 2003: 103-121
-
(2003)
Proc of the Financial Cryptography
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
30
-
-
33644534001
-
Lightweight authentication protocols for low-cost RFID tags
-
Budapest, Hungary; Budapest University of Technology and Economics
-
Vajda I, Buttydn L. Lightweight authentication protocols for low-cost RFID tags [C]//Proc of the 2nd Workshop on Security in Ubiquitous Computing. Budapest, Hungary; Budapest University of Technology and Economics, 2003
-
(2003)
Proc of the 2nd Workshop on Security in Ubiquitous Computing
-
-
Vajda, I.1
Buttydn, L.2
-
31
-
-
33744957484
-
Adversarial model for radio frequency identification, 2005/049
-
Avoine G. Adversarial model for radio frequency identification, 2005/049 [R/OL]. [2005-02-21]. http://eprint.iacr.org/, 2005
-
(2005)
-
-
Avoine, G.1
-
32
-
-
33749066158
-
™ radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz, Version 1.0.9
-
EPCglobal. Cambridge, MA: EPCglobal Inc.
-
™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz, Version 1.0.9[S]. Cambridge, MA: EPCglobal Inc., 2004
-
(2004)
-
-
-
33
-
-
65349113973
-
ISO 18000-6, RFID for item management-air interface. Part 6: Parameters for air interface communications at 860 MHz to 960 MHz
-
International Organization for Standardization (ISO)
-
International Organization for Standardization (ISO). ISO 18000-6, RFID for Item Management-Air Interface, Part 6: Parameters for Air Interface Communications at 860 MHz to 960 MHz [S]. 2004
-
(2004)
-
-
-
36
-
-
33947382591
-
Cryptography on a speck of dust
-
Kaps J P, Gaubatz G, Sunar B. Cryptography on a speck of dust [J]. IEEE Computer Magazine, 2007, 40(2): 38-44
-
(2007)
IEEE Computer Magazine
, vol.40
, Issue.2
, pp. 38-44
-
-
Kaps, J.P.1
Gaubatz, G.2
Sunar, B.3
|