-
1
-
-
84860697497
-
-
RFID toll collection systems, 2007. Available at: http://www.securitysa. com/news.aspx?pklnewsid=25591.
-
(2007)
RFID Toll Collection Systems
-
-
-
4
-
-
84860658288
-
-
GPS Glossory, 2011. Available at: http://www.gsmarena.com/glossary.php3? term=gps.
-
(2011)
GPS Glossory
-
-
-
5
-
-
84860685161
-
-
NMEA 0183 Standard, 2011. Available at: http://www.nmea.org/content/nmea- standards/nmea-083-v-400.asp.
-
(2011)
NMEA 0183 Standard
-
-
-
11
-
-
70349301622
-
RFIDs and secret handshakes: Defending against Ghost-and-Leech attacks and unauthorized reads with context-aware communications
-
A. Czeskis, K. Koscher, J. Smith, and T. Kohno. RFIDs and secret handshakes: Defending against Ghost-and-Leech attacks and unauthorized reads with context-aware communications. In ACM Conference on Computer and Communications Security, 2008.
-
(2008)
ACM Conference on Computer and Communications Security
-
-
Czeskis, A.1
Koscher, K.2
Smith, J.3
Kohno, T.4
-
12
-
-
85066944987
-
Keep your enemies close:Distance bounding against smartcard relay attacks
-
August
-
S. Drimer and S. J. Murdoch. Keep your enemies close:Distance bounding against smartcard relay attacks. In 16th USENIX Security Symposium, August 2007.
-
(2007)
16th USENIX Security Symposium
-
-
Drimer, S.1
Murdoch, S.J.2
-
17
-
-
80053012834
-
-
online at, January
-
B. Hanlon, B. Ledvina, M. Psiaki, P. K. Jr., and T. E. Humphreys. Assessing the GPS spoofing threat. GPS World, Available online at http://www.gpsworld.com/defense/security-surveillance/assessing-spoofing-threat- 3171?page-id=1, January 2009.
-
(2009)
Assessing the GPS Spoofing Threat
-
-
Hanlon, B.1
Ledvina, B.2
Psiaki, M.3
K Jr., P.4
Humphreys, T.E.5
-
18
-
-
70349287159
-
Vulnerabilities in first-generation RFID-enabled credit cards
-
T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and T. O'Hare. Vulnerabilities in first-generation RFID-enabled credit cards. In Financial Cryptography, 2007.
-
(2007)
Financial Cryptography
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O'hare, T.5
-
19
-
-
63649112419
-
NeuralWISP: An energy-harvesting wireless neural interface with 1-m range
-
J. Holleman, D. Yeager, R. Prasad, J. Smith, and B. Otis. NeuralWISP: An energy-harvesting wireless neural interface with 1-m range. In Biomedical Circuits and Systems Conference (BioCAS), 2008.
-
(2008)
Biomedical Circuits and Systems Conference (BioCAS)
-
-
Holleman, J.1
Yeager, D.2
Prasad, R.3
Smith, J.4
Otis, B.5
-
20
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2):381-394, February 2006. (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
28
-
-
74049091231
-
EPC RFID tag security weaknesses and defenses: Passport cards, enhanced drivers licenses, and beyond
-
K. Koscher, A. Juels, V. Brajkovic, and T. Kohno. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. In ACM Conference on Computer and Communications Security, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
-
-
Koscher, K.1
Juels, A.2
Brajkovic, V.3
Kohno, T.4
-
29
-
-
25844454876
-
An asymmetric security mechanism for navigation signals
-
M. Kuhn. An asymmetric security mechanism for navigation signals. In 6th Information Hiding Workshop, 2004.
-
(2004)
6th Information Hiding Workshop
-
-
Kuhn, M.1
-
32
-
-
62349142337
-
GNSS-based positioning: Attacks and countermeasures
-
San Diego, CA, USA, November 16-19
-
P. Papadimitratos and A. Jovanovic. GNSS-based positioning: Attacks and countermeasures. In IEEE Military Communications Conference (MILCOM), pages 1-7, San Diego, CA, USA, November 16-19 2008.
-
(2008)
IEEE Military Communications Conference (MILCOM)
, pp. 1-7
-
-
Papadimitratos, P.1
Jovanovic, A.2
-
38
-
-
84858390549
-
Design of a passively-powered, programmable sensing platform for UHF RFID systems
-
A. Sample, D. Yeager, P. Powledge, and J. Smith. Design of a passively-powered, programmable sensing platform for UHF RFID systems. In IEEE International Conference on RFID, 2007.
-
(2007)
IEEE International Conference on RFID
-
-
Sample, A.1
Yeager, D.2
Powledge, P.3
Smith, J.4
-
40
-
-
84860658281
-
Still and silent: Motion detection for enhanced rfid security and privacy without changing the usage model
-
June
-
N. Saxena and J. Voris. Still and silent: Motion detection for enhanced rfid security and privacy without changing the usage model. In Workshop on RFID Security (RFIDSec), June 2010.
-
(2010)
Workshop on RFID Security (RFIDSec)
-
-
Saxena, N.1
Voris, J.2
-
45
-
-
84860655027
-
Privacy in pervasive computing: What can technologists do?
-
online, September
-
D. Wagner. Privacy in pervasive computing: What can technologists do? Invited talk, SECURECOMM 2005. Available online at http://www.cs.berkeley.edu/ ~daw/talks/SECCOM05.ppt, September 2005.
-
(2005)
Invited Talk, SECURECOMM 2005
-
-
Wagner, D.1
|