-
1
-
-
85158857813
-
-
http://www.avoine.net/rfid/index.html
-
-
-
-
2
-
-
85158836994
-
-
http://www.ettus.com/
-
-
-
-
3
-
-
85158823688
-
-
http://www.gnu.org/software/gnuradio/
-
-
-
-
4
-
-
74049109627
-
An efficient forward private RFID protocol
-
Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An efficient forward private RFID protocol. In: Proc. ACM Conference on Computer and Communications Security, pp. 43-53 (2009)
-
(2009)
Proc. ACM Conference on Computer and Communications Security
, pp. 43-53
-
-
Berbain, C.1
Billet, O.2
Etrog, J.3
Gilbert, H.4
-
5
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proc. ACM International Conference on Mobile Computing and Networking (2008)
-
Proc. ACM International Conference on Mobile Computing and Networking (2008)
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
9
-
-
33751513718
-
Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
-
Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. In: Proc. Symposium on Cryptography and Information Security (2006)
-
Proc. Symposium on Cryptography and Information Security (2006)
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
10
-
-
0035388827
-
Characteristics of radio transmitter fingerprints
-
Ellis, K., Serinken, N.: Characteristics of radio transmitter fingerprints. Radio Science 36, 585-597 (2001)
-
(2001)
Radio Science
, vol.36
, pp. 585-597
-
-
Ellis, K.1
Serinken, N.2
-
12
-
-
85158855686
-
-
ETSI: ETSI EN 302 208-1 (2006)
-
ETSI: ETSI EN 302 208-1 (2006)
-
-
-
-
14
-
-
11144331561
-
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
-
Hall, J., Barbeau, M., Kranakis, E.: Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In: Proc. Communications, Internet, and Information Technology (2004)
-
Proc. Communications, Internet, and Information Technology (2004)
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
19
-
-
74049091231
-
EPC RFID tag security weaknesses and defenses: Passport cards, enhanced drivers licenses, and beyond
-
Koscher, K., Juels, A., Kohno, T., Brajkovic, V.: EPC RFID tag security weaknesses and defenses: Passport cards, enhanced drivers licenses, and beyond. In: Proc. ACM Conference on Computer and Communications Security (2009)
-
Proc. ACM Conference on Computer and Communications Security (2009)
-
-
Koscher, K.1
Juels, A.2
Kohno, T.3
Brajkovic, V.4
-
20
-
-
77952337733
-
Low-cost untraceable authentication protocols for RFID
-
Lee, Y.K., Batina, L., Singelée, D., Verbauwhede, I.: Low-cost untraceable authentication protocols for RFID. In: Proc. ACM Conference on Wireless Network Security (2010)
-
Proc. ACM Conference on Wireless Network Security (2010)
-
-
Lee, Y.K.1
Batina, L.2
Singelée, D.3
Verbauwhede, I.4
-
23
-
-
84871212721
-
Fingerprinting radio frequency identification tags using timing characteristics
-
Periaswamy, S.C.G., Thompson, D.R., Romero, H.P., Di, J.: Fingerprinting radio frequency identification tags using timing characteristics. In: Proc.Workshop on RFID Security - RFIDsec Asia (2010)
-
Proc.Workshop on RFID Security - RFIDsec Asia (2010)
-
-
Periaswamy, S.C.G.1
Thompson, D.R.2
Romero, H.P.3
Di, J.4
-
25
-
-
77950633052
-
Improved wireless security for GMSKbased devices using RF fingerprinting
-
Reising, D.R., Temple, M.A., Mendenhall, M.J.: Improved wireless security for GMSKbased devices using RF fingerprinting. International Journal of Electronic Security and Digital Forensics 3, 41-59 (2010)
-
(2010)
International Journal of Electronic Security and Digital Forensics
, vol.3
, pp. 41-59
-
-
Reising, D.R.1
Temple, M.A.2
Mendenhall, M.J.3
-
27
-
-
67649259238
-
Electromagnetic measurements for counterfeit detection of radio frequency identification cards
-
Romero, H.P., Remley, K.A., Williams, D.F., Wang, C.M.: Electromagnetic measurements for counterfeit detection of radio frequency identification cards. IEEE Transactions on Microwave Theory and Techniques 57(5), 1383-1387 (2009)
-
(2009)
IEEE Transactions on Microwave Theory and Techniques
, vol.57
, Issue.5
, pp. 1383-1387
-
-
Romero, H.P.1
Remley, K.A.2
Williams, D.F.3
Wang, C.M.4
-
28
-
-
77954657689
-
Identifying RF identification cards from measurements of resonance and carrier harmonics
-
Romero, H.P., Remley, K.A.,Williams, D.F.,Wang, C.M., Brown, T.X.: Identifying RF identification cards from measurements of resonance and carrier harmonics. IEEE Transactions on Microwave Theory and Techniques 58(7), 1758-1765 (2010)
-
(2010)
IEEE Transactions on Microwave Theory and Techniques
, vol.58
, Issue.7
, pp. 1758-1765
-
-
Romero, H.P.1
Remley, K.A.2
Williams, D.F.3
Wang, C.M.4
Brown, T.X.5
-
29
-
-
84940644968
-
A mathematical theory of communication
-
Shannon, C.: A mathematical theory of communication. The Bell System Technical Journal 27, 379-423 (1948)
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.1
-
31
-
-
77649263434
-
Privacy enhancing technologies for RFID - A critical investigation of state of the art research
-
Spiekermann, S., Evdokimov, S.: Privacy enhancing technologies for RFID - A critical investigation of state of the art research. In: Proc. IEEE Privacy and Security (2009)
-
Proc. IEEE Privacy and Security (2009)
-
-
Spiekermann, S.1
Evdokimov, S.2
-
32
-
-
0033326545
-
Detection of radio transmitter turn-on transients
-
Ureten, O., Serinken, N.: Detection of radio transmitter turn-on transients. Electronic Letters 35, 1996-1997 (2007)
-
(2007)
Electronic Letters
, vol.35
, pp. 1996-1997
-
-
Ureten, O.1
Serinken, N.2
|