-
1
-
-
74049096010
-
-
New York to o er enhanced driver's license. Newsday, 16 September 2008. Referenced October 2008 at http://www.newsday.com/services/newspaper/ printedition/tuesday/news/nynylice165845220sep16,0,5665783,print.story.
-
New York to o er enhanced driver's license. Newsday, 16 September 2008. Referenced October 2008 at http://www.newsday.com/services/newspaper/ printedition/tuesday/news/nynylice165845220sep16,0,5665783,print.story.
-
-
-
-
2
-
-
74049123758
-
-
Card format passport; changes to passport fee schedule [final action]; 22 CFR parts 22 and 51. Federal Register, 72(249):74169-74173, December 31, 2007. Referenced 2008 at http://www.gpoaccess.gov/fr.
-
Card format passport; changes to passport fee schedule [final action]; 22 CFR parts 22 and 51. Federal Register, 72(249):74169-74173, December 31, 2007. Referenced 2008 at http://www.gpoaccess.gov/fr.
-
-
-
-
3
-
-
74049123302
-
-
Card format passport; changes to passport fee schedule [proposed rule]; 22 CFR parts 22 and 51. Federal Register, 71(200):60928-60932, October 17, 2006. Referenced 2008 at http://www.gpoaccess.gov/fr.
-
Card format passport; changes to passport fee schedule [proposed rule]; 22 CFR parts 22 and 51. Federal Register, 71(200):60928-60932, October 17, 2006. Referenced 2008 at http://www.gpoaccess.gov/fr.
-
-
-
-
4
-
-
74049148338
-
-
Smart Card Alliance. Comments of the smart card alliance to the department of state federal register notice, \card format passport; changes to passport fee schedule, 22 CFR parts 22 and 51, rin 1400-ac22, public notice 5558, 3 November 2006. Referenced 2008 at http://www.smartcardalliance. org/resources/pdf/Smart Card Alliance Response Passport Card Final.pdf.
-
Smart Card Alliance. Comments of the smart card alliance to the department of state federal register notice, \card format passport; changes to passport fee schedule," 22 CFR parts 22 and 51, rin 1400-ac22, public notice 5558, 3 November 2006. Referenced 2008 at http://www.smartcardalliance. org/resources/pdf/Smart Card Alliance Response Passport Card Final.pdf.
-
-
-
-
6
-
-
74049091087
-
-
Online bibliography: Security and privacy in RFID systems, 2008. Referenced 2008 at
-
G. Avoine. Online bibliography: Security and privacy in RFID systems, 2008. Referenced 2008 at http://www.avoine.net/rid.
-
-
-
Avoine, G.1
-
7
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
P. McDaniel, editor, USENIX
-
S. Bono, M. Green, A. Stubble eld, A. Juels, A. Rubin, and M. Szydlo. Security analysis of a cryptographically-enabled RFID device. In P. McDaniel, editor, 14th USENIX Security Symposium, pages 1-16. USENIX, 2005.
-
(2005)
14th USENIX Security Symposium
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubble eld, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
8
-
-
84986346822
-
The differential impact of abstract vs. concrete information on decisions
-
E. Borgida and R. E. Nisbett. The differential impact of abstract vs. concrete information on decisions. Journal of Applied Social Psychology, (7):258-271,1977.
-
(1977)
Journal of Applied Social Psychology
, vol.7
, pp. 258-271
-
-
Borgida, E.1
Nisbett, R.E.2
-
10
-
-
19644380066
-
The role of memory representation in the vigilance decrement
-
October
-
D. M. Caggiano and R. Parasuraman. The role of memory representation in the vigilance decrement. Psychonomic Bulletin and Review, 11(5):932-937, October 2004.
-
(2004)
Psychonomic Bulletin and Review
, vol.11
, Issue.5
, pp. 932-937
-
-
Caggiano, D.M.1
Parasuraman, R.2
-
11
-
-
85066934773
-
-
B. Danev, T. S. Heydt-Benjamin, and S. Capkun. Physical-layer identification of RFID devices. In 18th USENIX Security Symposium, pages 199{214, 2009.
-
B. Danev, T. S. Heydt-Benjamin, and S. Capkun. Physical-layer identification of RFID devices. In 18th USENIX Security Symposium, pages 199{214, 2009.
-
-
-
-
12
-
-
70350601194
-
-
F. D. Garcia, P. van Rossum, R. Verdult, and R. W. Schreur. Wirelessly pickpocketing a Mifare Classic card. In IEEE Symposium on Security and Privacy (S&P 2009), pages 3{15. IEEE, 2009.
-
F. D. Garcia, P. van Rossum, R. Verdult, and R. W. Schreur. Wirelessly pickpocketing a Mifare Classic card. In IEEE Symposium on Security and Privacy (S&P 2009), pages 3{15. IEEE, 2009.
-
-
-
-
16
-
-
38549131714
-
Vulnerabilities in first-generation RFID-enabled credit cards
-
T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and T. O'Hare. Vulnerabilities in first-generation RFID-enabled credit cards. In Financial Cryptography, pages 2-14, 2007.
-
(2007)
Financial Cryptography
, pp. 2-14
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O'Hare, T.5
-
17
-
-
74049145928
-
-
EPCglobal Inc. Class 1 generation 2 UHF air interface protocol standard version 1.1.0. Referenced 2008 at
-
EPCglobal Inc. Class 1 generation 2 UHF air interface protocol standard version 1.1.0. Referenced 2008 at http://www.epcglobalinc.org/standards/uhfc1g2/ uhfc1g2 1 1 0-standard-20071017.pdf.
-
-
-
-
18
-
-
84935078039
-
Security weaknesses in Bluetooth
-
D. Naccache, editor, The Cryptographer's Track at RSA, of, Springer-Verlag
-
M. Jakobsson and S. Wetzel. Security weaknesses in Bluetooth. In D. Naccache, editor, The Cryptographer's Track at RSA, volume 2020 of Lecture Notes in Computer Science, pages 176-191. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
19
-
-
33749028998
-
Strengthing EPC tags against cloning
-
ACM Press
-
A. Juels. Strengthing EPC tags against cloning. In ACM Workshop on Wireless Security (WiSe), pages 67-76. ACM Press, 2005.
-
(2005)
ACM Workshop on Wireless Security (WiSe)
, pp. 67-76
-
-
Juels, A.1
-
21
-
-
33847249519
-
-
A. Juels, D. Molnar, and D. Wagner. Security and privacy issues in e-passports. In D. Gollman, G. Li, and G. Tsudik, editors, SecureComm, pages 74-88. IEEE, 2005. Referenced 2008 at http://eprint.iacr.org/2005/095.pdf.
-
A. Juels, D. Molnar, and D. Wagner. Security and privacy issues in e-passports. In D. Gollman, G. Li, and G. Tsudik, editors, SecureComm, pages 74-88. IEEE, 2005. Referenced 2008 at http://eprint.iacr.org/2005/095.pdf.
-
-
-
-
22
-
-
79957448997
-
Where's the beep?: Security, privacy, and user misunderstandings of RFID
-
J. King and A. Mcdiarmid. Where's the beep?: security, privacy, and user misunderstandings of RFID. In Useability, Psychology, and Security, pages 1-8, 2008.
-
(2008)
Useability, Psychology, and Security
, pp. 1-8
-
-
King, J.1
Mcdiarmid, A.2
-
23
-
-
72849133459
-
EPC RFID tags in security applications: Passport Cards, Enhanced Drivers Licenses, and beyond
-
Technical report. Available at
-
K. Koscher, A. Juels, T. Kohno, and V. Brajkovic. EPC RFID tags in security applications: Passport Cards, Enhanced Drivers Licenses, and beyond. Technical report. Available at ftp://ftp.cs.washington.edu/tr/2008/10/UW-CSE-08- 10-02.PDF.
-
-
-
Koscher, K.1
Juels, A.2
Kohno, T.3
Brajkovic, V.4
-
24
-
-
0000245521
-
Con rmation bias: A ubiquitous phenomenon in many guises
-
R. S. Nickerson. Con rmation bias: A ubiquitous phenomenon in many guises. Review of General Psychology, 2(2):175-220, 1998.
-
(1998)
Review of General Psychology
, vol.2
, Issue.2
, pp. 175-220
-
-
Nickerson, R.S.1
-
25
-
-
84893081352
-
Reverse-engineering a cryptographic RFID tag
-
K. Nohl, D. Evans, Starbug, and H. Plötz. Reverse-engineering a cryptographic RFID tag. In USENIX Security, pages 185-193, 2008.
-
(2008)
USENIX Security
, pp. 185-193
-
-
Nohl, K.1
Evans, D.2
Starbug3
Plötz, H.4
-
26
-
-
74049118636
-
-
F. Nylander. Alien Technology Higgs Gen2 IC LoadImage command application note 1 for 96 bit EPC memory, revision 7, 14 December 2006. Referenced 12 Sept. 2008 at http://www.alientechnology.com/docs/Load Image Applicaton Note 1.pdf.
-
F. Nylander. Alien Technology Higgs Gen2 IC LoadImage command application note 1 for 96 bit EPC memory, revision 7, 14 December 2006. Referenced 12 Sept. 2008 at http://www.alientechnology.com/docs/Load Image Applicaton Note 1.pdf.
-
-
-
-
27
-
-
74049132962
-
-
M. C. O'Connor. Industry group says e-passport clone poses little risk. RFID Journal, 9 August 2006. Referenced 2008 at http://www.rfidjournal. com/article/articleview/2559/1/1/.
-
M. C. O'Connor. Industry group says e-passport clone poses little risk. RFID Journal, 9 August 2006. Referenced 2008 at http://www.rfidjournal. com/article/articleview/2559/1/1/.
-
-
-
-
28
-
-
74049115691
-
-
United States Department of Homeland Security. Privacy impact assessment for the use of radio frequency identification (RFID) technology for border crossings, 22 January 2008. Referenced 2008 at http://www.dhs.gov/xlibrary/ assets/privacy/privacy pia cbp rfid.pdf.
-
United States Department of Homeland Security. Privacy impact assessment for the use of radio frequency identification (RFID) technology for border crossings, 22 January 2008. Referenced 2008 at http://www.dhs.gov/xlibrary/ assets/privacy/privacy pia cbp rfid.pdf.
-
-
-
-
29
-
-
74049140570
-
-
Washington State Department of Licensing. FAQ: EDL / ID, 2008. Referenced 2008 at http://www.dol.wa.gov/driverslicense/edlfaq.html.
-
Washington State Department of Licensing. FAQ: EDL / ID, 2008. Referenced 2008 at http://www.dol.wa.gov/driverslicense/edlfaq.html.
-
-
-
-
30
-
-
74049150150
-
-
OpenPCD project, at
-
OpenPCD project, 2008. Referenced 2008 at www.openpcd.org.
-
(2008)
Referenced 2008
-
-
-
31
-
-
85094317081
-
A platform for RFID security and privacy administration
-
Current project information referenced at
-
M. R. Rieback, G. Gaydadjiev, B. Crispo, R. F. H. Hofman, and A. S. Tanenbaum. A platform for RFID security and privacy administration. In USENIX LISA, pages 89-102, 2006. Current project information referenced 2008 at www.rfidguardian.org.
-
(2006)
USENIX LISA
, pp. 89-102
-
-
Rieback, M.R.1
Gaydadjiev, G.2
Crispo, B.3
Hofman, R.F.H.4
Tanenbaum, A.S.5
-
32
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
T. S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In 16th USENIX Security Symposium, pages 55-70, 2007.
-
(2007)
16th USENIX Security Symposium
, pp. 55-70
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
33
-
-
0000029930
-
Social explanation: The role of timing, set, and recall on subjective likelihood estimates
-
S.J. Sherman, K.S. Zehner, J. Johnson, and E.R. Hirt. Social explanation: The role of timing, set, and recall on subjective likelihood estimates. Journal of Personality and Social Psychology, 44:1127-1143, 1983.
-
(1983)
Journal of Personality and Social Psychology
, vol.44
, pp. 1127-1143
-
-
Sherman, S.J.1
Zehner, K.S.2
Johnson, J.3
Hirt, E.R.4
-
34
-
-
74049091504
-
-
Read range for Gen2 RFID in 2008? 40 feet. RFID Update, 14 August 2008. Referenced 2008 at http://www.rfidupdate.com/articles/index.php?id=1656.
-
Read range for Gen2 RFID in 2008? 40 feet. RFID Update, 14 August 2008. Referenced 2008 at http://www.rfidupdate.com/articles/index.php?id=1656.
-
-
-
-
36
-
-
33750345292
-
A wirelessly-powered platform for sensing and computation
-
J. R. Smith, A. P. Sample, P. S. Powledge, S. Roy, and A. Mamishev. A wirelessly-powered platform for sensing and computation. In Ubicomp, pages 495-506, 2006.
-
(2006)
Ubicomp
, pp. 495-506
-
-
Smith, J.R.1
Sample, A.P.2
Powledge, P.S.3
Roy, S.4
Mamishev, A.5
-
38
-
-
74049130510
-
-
Identity Stronghold. Washington State Enhanced Drivers License guarded by Identity Stronghold Secure Sleeve. Company annotation on news article. Referenced 11 September 2008 at www.identitystronghold.com/links.php.
-
Identity Stronghold. Washington State Enhanced Drivers License guarded by Identity Stronghold Secure Sleeve. Company annotation on news article. Referenced 11 September 2008 at www.identitystronghold.com/links.php.
-
-
-
-
39
-
-
74049094184
-
-
C. Swedberg. All eyes on FDA for drug e-pedigree. RFID Journal, 2008. Referenced 2008 at http://www.rfidjournal.com/article/articleview/4013/1/ 1.
-
C. Swedberg. All eyes on FDA for drug e-pedigree. RFID Journal, 2008. Referenced 2008 at http://www.rfidjournal.com/article/articleview/4013/1/ 1.
-
-
-
-
41
-
-
0033768584
-
Perceived probability, perceived severity, and health-protective behavior
-
N. D. Weinstein. Perceived probability, perceived severity, and health-protective behavior. Health Psychology, 19:65-74, 2000.
-
(2000)
Health Psychology
, vol.19
, pp. 65-74
-
-
Weinstein, N.D.1
-
42
-
-
33144462296
-
Hacking the prox card
-
S. Garfinkel and B. Rosenberg, editors, Addison-Wesley
-
J. Westhues. Hacking the prox card. In S. Garfinkel and B. Rosenberg, editors, RFID: Applications, Security, and Privacy, pages 291-300. Addison-Wesley, 2005.
-
(2005)
RFID: Applications, Security, and Privacy
, pp. 291-300
-
-
Westhues, J.1
-
43
-
-
0034296795
-
A meta-analysis of fear appeals: Implications for effective public health campaigns
-
K. Witte and M. Allen. A meta-analysis of fear appeals: Implications for effective public health campaigns. Health Education and Behavior, 27(5):591-615, 2000.
-
(2000)
Health Education and Behavior
, vol.27
, Issue.5
, pp. 591-615
-
-
Witte, K.1
Allen, M.2
|