-
1
-
-
33144477650
-
RFID in healthcare
-
Fishkin, K. and Lundell, J. (2005) 'RFID in healthcare', RFID: Applications, Security, and Privacy, pp.211-228.
-
(2005)
RFID: Applications, Security, and Privacy
, pp. 211-228
-
-
Fishkin, K.1
Lundell, J.2
-
2
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
Garfinkel, S.L., Juels, A. and Pappu, R. (2005) 'RFID privacy: an overview of problems and proposed solutions', IEEE Security and Privacy, Vol.03, No.3, pp.34-43.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
3
-
-
20444478767
-
-
WPES, ACM, ACM Press
-
Juels, A. and Brainard, J. (2004) 'Soft blocking: flexible blocker tags on the cheap', WPES, ACM, ACM Press, pp.1-7.
-
(2004)
Soft Blocking: Flexible Blocker Tags on the Cheap
, pp. 1-7
-
-
Juels, A.1
Brainard, J.2
-
4
-
-
35248832722
-
Squealing euros: Privacy protection in RFID-enabled banknotes
-
Wright, R.N. (Ed.) , Volume 2742 of Lecture Notes in Computer Science, Le Gosier, Guadeloupe, French West Indies, IFCA, Springer-Verlag
-
Juels, A. and Pappu, R. (2003) 'Squealing euros: privacy protection in RFID-enabled banknotes', in Wright, R.N. (Ed.): Financial Cryptography - FC'03, Volume 2742 of Lecture Notes in Computer Science, Le Gosier, Guadeloupe, French West Indies, IFCA, Springer-Verlag, pp.103-121.
-
(2003)
Financial Cryptography - FC'03
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
5
-
-
69649087041
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
Juels, A., Rivest, R. and Szydlo, M. (2003) 'The blocker tag: selective blocking of RFID tags for consumer privacy', Consumer Privacy, citeseer.ist.psu.edu/juels03blocker.html
-
(2003)
Consumer Privacy
-
-
Juels, A.1
Rivest, R.2
Szydlo, M.3
-
6
-
-
84974691493
-
On the minimal hardware complexity of pseudorandom function generators
-
Volume 2010 of Lecture Notes in Computer Science
-
Krause, M. and Licks, S. (2001) 'On the minimal hardware complexity of pseudorandom function generators', Theoretical Aspects of Computer Science, Volume 2010 of Lecture Notes in Computer Science.
-
(2001)
Theoretical Aspects of Computer Science
-
-
Krause, M.1
Licks, S.2
-
7
-
-
69649094594
-
Security and privacy: Modest proposals for low-cost rfid systems
-
Volume 2010 of Lecture Notes in Computer Science
-
Ranasinghe, D., Engels, D. and Cole, P. (2001) 'Security and privacy: modest proposals for low-cost rfid systems', Theoretical Aspects of Computer Science, Volume 2010 of Lecture Notes in Computer Science.
-
(2001)
Theoretical Aspects of Computer Science
-
-
Ranasinghe, D.1
Engels, D.2
Cole, P.3
-
8
-
-
35248872610
-
RFID systems and security and privacy implications
-
Volume 2523 of Lecture Notes in Computer Science
-
Sarma, S.E., Weis, S.A. and Engels, D.W. (2002) 'RFID systems and security and privacy implications', Workshop on Cryptographic Hardware and Embedded Systems, Volume 2523 of Lecture Notes in Computer Science, pp.454-470.
-
(2002)
Workshop on Cryptographic Hardware and Embedded Systems
, pp. 454-470
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
9
-
-
77949763774
-
-
illustrated edition, Springer-Verlag
-
Schuster, E., Allen, S. and Brock, D. (2007) Global RFID: The Value of the EPCglobal Network for Supply Chain Management, illustrated edition, Springer-Verlag, XXVI, 310, p.33.
-
(2007)
Global RFID: The Value of the EPCglobal Network for Supply Chain Management
, vol.26
, Issue.310
, pp. 33
-
-
Schuster, E.1
Allen, S.2
Brock, D.3
-
10
-
-
0035517587
-
An ultra small individual recognition security chip
-
Takaragi, K., Usami, M., Imura, R., Itsuki, R. and Satoh, T. (2001) 'An ultra small individual recognition security chip', IEEE Micro, Vol.21, No.6, pp.43-49.
-
(2001)
IEEE Micro
, vol.21
, Issue.6
, pp. 43-49
-
-
Takaragi, K.1
Usami, M.2
Imura, R.3
Itsuki, R.4
Satoh, T.5
-
12
-
-
77949753698
-
Ya-trap: Yet another trivial rfid authentication protocol
-
Volume 2010 of Lecture Notes in Computer Science
-
Tsudik, G. (2005) 'Ya-trap: Yet another trivial rfid authentication protocol', Theoretical Aspects of Computer Science, Volume 2010 of Lecture Notes in Computer Science.
-
(2005)
Theoretical Aspects of Computer Science
-
-
Tsudik, G.1
-
13
-
-
14644433066
-
A flexible payment scheme and its role based access control
-
Wang, H., Cao, J. and Zhang, Y. (2005) 'A flexible payment scheme and its role based access control', IEEE Transactions on Knowledge and Data Engineering, Vol.17, No.3, pp.425-436.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.3
, pp. 425-436
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
-
14
-
-
46849089265
-
Access control management for ubiquitous computing
-
Wang, H., Cao, J. and Zhang, Y. (2008) 'Access control management for ubiquitous computing', Future Generation Computer Systems journal, Vol.24, pp.870-878.
-
(2008)
Future Generation Computer Systems Journal
, vol.24
, pp. 870-878
-
-
Wang, H.1
Cao, J.2
Zhang, Y.3
-
15
-
-
2942614621
-
Security and privacy in radio-frequency identification devices
-
Weis, S. (2003) Security and Privacy in Radio-frequency Identification Devices, Massachusetts Institute Technology, http://groups.csail.mit.edu/cis/ theses/weismasters.Pdf
-
(2003)
Massachusetts Institute Technology
-
-
Weis, S.1
-
16
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Volume 2802 of Lecture Notes in Computer Science
-
Weis, S.A., Sarma, S.E., Rivest, R.L. and Engels, D.W. (2004) 'Security and privacy aspects of low-cost radio frequency identification systems', Security in Pervasive Computing, Volume 2802 of Lecture Notes in Computer Science, pp.201-212.
-
(2004)
Security in Pervasive Computing
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
17
-
-
77949702897
-
-
Wikipedia (2007) Electronic Product Code, http://en.wikipedia.org/wiki/ Electronic-Product-Code
-
(2007)
Electronic Product Code
-
-
-
18
-
-
77949668640
-
-
Wikipedia (2007) 'ISO14443', http://en.wikipedia.org/wiki/ISO-14443.
-
(2007)
ISO14443
-
-
|