-
1
-
-
79957949627
-
-
CASPIAN Press Release. Last accessed June 2010
-
CASPIAN Press Release. Metro's decision to drop the loyalty card, 2004. Last accessed June 2010 - http://www.spychips.com/metro/press-release-feb-27. html
-
(2004)
Metro's Decision to Drop the Loyalty Card
-
-
-
2
-
-
34547687590
-
Defining strong privacy for RFID
-
A. Juels, and S. Weis. "Defining strong privacy for RFID". In Proc. of Pervasive Computing and Communications Workshops (PerComW 2007), New York, USA, 2007. pp. 342-347.
-
Proc. of Pervasive Computing and Communications Workshops (PerComW 2007), New York, USA, 2007
, pp. 342-347
-
-
Juels, A.1
Weis, S.2
-
3
-
-
24944575863
-
Cryptographic approach to privacy friendly tags
-
M. Ohkubo, K. Suzuki, and S. Kinoshita. "Cryptographic approach to privacy friendly tags". In Proc. of RFID Privacy Workshop, MIT, MA, USA, 2003.
-
Proc. of RFID Privacy Workshop, MIT, MA, USA, 2003
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
4
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Springer-Verlag, Germany
-
S. Weis, S. Sarma, R. Rivest, and D. Engels. "Security and privacy aspects of low-cost radio frequency identification systems". In Proc. of Security in Pervasive Computing (SPC 2003), Springer-Verlag, Vol. 2802. Germany. 2003. pp. 454-469.
-
(2003)
Proc. of Security in Pervasive Computing (SPC 2003)
, vol.2802
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
5
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
D. Molnar, and D. Wagner. "Privacy and security in library RFID: Issues, practices, and architectures". In Proc. of Computer and Communications Security. USA, 2004. pp. 210-219.
-
Proc. of Computer and Communications Security. USA, 2004
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
8
-
-
47749092385
-
Group-based private authentication
-
G. Avoine, L. Buttyan, T. Holczer, and I. Vajda. "Group-based private authentication". In Proc. of World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007). Finland. 2007. pp. 1-6.
-
Proc. of World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007). Finland. 2007
, pp. 1-6
-
-
Avoine, G.1
Buttyan, L.2
Holczer, T.3
Vajda, I.4
-
9
-
-
34547630116
-
-
Technical report, Department of Computer Science, Tallahassee, Florida. USA
-
C. Chatmon, T. v. Le, and M. Burmester. "Secure anonymous RFID authentication protocols". Technical report, Florida State University, Department of Computer Science, Tallahassee, Florida. USA. 2006. http://www.cs.fsu.edu/~burmeste/TR-060112.pdf
-
(2006)
Secure Anonymous RFID Authentication Protocols.
-
-
Chatmon, C.1
Le, T.V.2
Burmester, M.3
-
12
-
-
84856043672
-
A mathematical theory of communication
-
C. Shannon. "A mathematical theory of communication". In Bell System Technical Journal, Vol. 27, 1948. pp. 379-423 and 623-656.
-
(1948)
Bell System Technical Journal
, vol.27
-
-
Shannon, C.1
-
13
-
-
34548830678
-
Practical attacks against RFID
-
A. Laurie. "Practical attacks against RFID". In Network Security, 2007(9). pp. 4-7.
-
(2007)
Network Security
, Issue.9
, pp. 4-7
-
-
Laurie, A.1
-
15
-
-
33745621564
-
Reducing time complexity in RFID systems
-
B. Preneel and S. Tavares (Eds.), Selected Areas in Cryptography, Springer
-
G. Avoine, E. Dysli, and P. Oechslin. "Reducing time complexity in RFID systems". In B. Preneel and S. Tavares (Eds.), Selected Areas in Cryptography, Springer, LNCS 3897. 2005. pp 291-306.
-
(2005)
LNCS
, vol.3897
, pp. 291-306
-
-
Avoine, G.1
Dysli, E.2
Oechslin, P.3
-
17
-
-
70349337026
-
Randomizing RFID private authentication
-
doi: 10.1109/PERCOM.2009.4912773
-
Q. Yao, Y. Qi, J. Han, J. Zhao, X. Li, and Y. Liu. "Randomizing RFID private authentication". In Proc. of Pervasive Computing and Communications Workshop (PerCom Workshops 2009). 2009. pp.1-10. doi: 10.1109/PERCOM.2009.4912773
-
(2009)
Proc. of Pervasive Computing and Communications Workshop (PerCom Workshops 2009)
, pp. 1-10
-
-
Yao, Q.1
Qi, Y.2
Han, J.3
Zhao, J.4
Li, X.5
Liu, Y.6
-
18
-
-
34547662182
-
Determining the Position and Orientation of Multi-Tagged Objects Using RFID Technology
-
doi: 10.1109/PERCOMW.2007.38
-
S. Hinske. "Determining the Position and Orientation of Multi-Tagged Objects Using RFID Technology". In Proc. of Pervasive Computing and Communications Workshops (PerCom Workshops 2007). 2007. pp.377-381. doi: 10.1109/PERCOMW.2007.38
-
(2007)
Proc. of Pervasive Computing and Communications Workshops (PerCom Workshops 2007)
, pp. 377-381
-
-
Hinske, S.1
-
20
-
-
70349333869
-
RFID based localization for a miniaturized robotic platform for wireless protocols evaluation
-
V.P. Munishwar, S. Singh, C. Mitchell, W. Xiaoshuang, K. Gopalan, N.B Abu-Ghazaleh. "RFID based localization for a miniaturized robotic platform for wireless protocols evaluation". In Proc. of Pervasive Computing and Communications, (PerCom 2009). 2009. pp.1-3.
-
(2009)
Proc. of Pervasive Computing and Communications, (PerCom 2009)
, pp. 1-3
-
-
Munishwar, V.P.1
Singh, S.2
Mitchell, C.3
Xiaoshuang, W.4
Gopalan, K.5
Abu-Ghazaleh, N.B.6
-
24
-
-
70349368349
-
RFID in pervasive computing: Ctate-of-the-art and outlook
-
Elsevier
-
G. Roussos and V. Kostakos. "RFID in pervasive computing: ctate-of-the-art and outlook". In Pervasive and Mobile Comp., Elsevier, 2008.
-
(2008)
Pervasive and Mobile Comp.
-
-
Roussos, G.1
Kostakos, V.2
|