-
1
-
-
84875034599
-
-
RFID Toll Collection Systems
-
RFID Toll Collection Systems, http://www.securitysa.com/news.aspx? pklnewsid=25591, 2007
-
(2007)
-
-
-
2
-
-
84875017228
-
-
66-Channel LS20031 GPS Receiver Module
-
66-Channel LS20031 GPS Receiver Module, http://www. megachip.ru/pdf/ POLOLU/66-CHANNEL.pdf, 2011
-
(2011)
-
-
-
3
-
-
84875042280
-
-
GM-101 Cost Effective GPS Module with Ttl Rs-232 Interface
-
GM-101 Cost Effective GPS Module with Ttl Rs-232 Interface, http://www.alibaba.com/product-gs/435104168/GM-101-Cost-Effective-GPS-Module. html, 2011
-
(2011)
-
-
-
4
-
-
84875033199
-
-
GPS Glossory
-
GPS Glossory, http://www.gsmarena.com/glossary. php3?term=gps, 2011
-
(2011)
-
-
-
5
-
-
84875014156
-
-
NMEA 0183 Standard
-
NMEA 0183 Standard, http://www.nmea.org/content/nmea-standards/nmea-083- v-400.asp, 2011
-
(2011)
-
-
-
7
-
-
33845920117
-
HB++: A lightweight authentication protocol secure against some attacks
-
J. Bringer, H. Chabanne, and E. Dottax, "HB++: A Lightweight Authentication Protocol Secure against Some Attacks," Proc. Second Int'l Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006
-
(2006)
Proc. Second Int'l Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
8
-
-
80053010425
-
-
M. Buckner, R. Crutcher, M.R. Moore, and S.F. Smith, "GPS and Sensor-Enabled RFID Tags," http://www.ornl.gov/webworks/cppr/y2001/pres/ 118169.pdf, 2013
-
(2013)
GPS and Sensor-Enabled RFID Tags
-
-
Buckner, M.1
Crutcher, R.2
Moore, M.R.3
Smith, S.F.4
-
9
-
-
70450164056
-
Recognizing daily activities with rfid-based sensors
-
M. Buettner, R. Prasad, M. Philipose, and D. Wetherall, "Recognizing Daily Activities with RFID-Based Sensors," Proc. Int'l Conf. Ubiquitous Computing (UbiComp), 2009
-
(2009)
Proc. Int'l Conf. Ubiquitous Computing (UbiComp)
-
-
Buettner, M.1
Prasad, R.2
Philipose, M.3
Wetherall, D.4
-
12
-
-
70349301622
-
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
-
A. Czeskis, K. Koscher, J. Smith, and T. Kohno., "RFIDs and Secret Handshakes: Defending against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications," Proc. ACM Conf. Computer and Comm. Security, 2008
-
(2008)
Proc. ACM Conf. Computer and Comm. Security
-
-
Czeskis, A.1
Koscher, K.2
Smith, J.3
Kohno, T.4
-
14
-
-
85066944987
-
Keep your enemies close: distance bounding against smartcard relay attacks
-
Aug.
-
S. Drimer and S.J. Murdoch, "Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks," Proc. 16th USENIX Security Symp., Aug. 2007
-
(2007)
Proc. 16th USENIX Security Symp.
-
-
Drimer, S.1
Murdoch, S.J.2
-
15
-
-
84875033522
-
-
EMVCo About EMV Nov.
-
EMVCo, "About EMV,"http://www.emvco.com/about-emv. aspx, Nov. 2009
-
(2009)
-
-
-
20
-
-
85015432655
-
Secure proximity detection for nfc devices based on ambient sensor data
-
T. Halevi, D. Ma, N. Saxena, and T. Xiang, "Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data," Proc. European Symp. Research in Computer Security (ESORICS), Sept. 2012
-
(2012)
Proc. European Symp. Research in Computer Security (ESORICS), Sept.
-
-
Halevi, T.1
Ma, D.2
Saxena, N.3
Xiang, T.4
-
22
-
-
80053012834
-
Assessing the gps spoofing threat
-
Jan.
-
B. Hanlon, B. Ledvina, M. Psiaki, P.M. Kitner., and T.E. Humphreys, "Assessing the GPS Spoofing Threat," GPS World, http://www.gpsworld. com/defense/security-surveillance/assessing-spoofin g-threat-3171?page-id=1, Jan. 2009
-
(2009)
GPS World, Http://www.gpsworld.com/defense/security-surveillance/ Assessing-spoofin g-threat-3171?page-id=1
-
-
Hanlon, B.1
Ledvina, B.2
Psiaki, M.3
Kitner, P.M.4
Humphreys, T.E.5
-
23
-
-
70349287159
-
Vulnerabilities in first-generation rfid-enabled credit cards
-
T.S. Heydt-Benjamin, D.V. Bailey, K. Fu, A. Juels, and T. O'Hare, "Vulnerabilities in First-Generation RFID-Enabled Credit Cards," Proc. Int'l Conf. Financial Cryptography and Data Security, 2007
-
(2007)
Proc. Int'l Conf. Financial Cryptography and Data Security
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O'hare, T.5
-
24
-
-
63649112419
-
Neuralwisp: An energy-harvesting wireless neural interface with 1-m range
-
J. Holleman, D. Yeager, R. Prasad, J. Smith, and B. Otis, "NeuralWISP: An Energy-Harvesting Wireless Neural Interface with 1-m Range," Proc. Biomedical Circuits and Systems Conf. (BioCAS), 2008
-
(2008)
Proc. Biomedical Circuits and Systems Conf. (BioCAS)
-
-
Holleman, J.1
Yeager, D.2
Prasad, R.3
Smith, J.4
Otis, B.5
-
25
-
-
84875044339
-
-
Infowars.com, Sept. Texas Department of Transportation to Instate RFID TxTag
-
Infowars.com, "Texas Department of Transportation to Instate RFID TxTag," http://www.infowars.com/articles/bb/toll-roads-tx-tag.htm, Sept. 2005
-
(2005)
-
-
-
27
-
-
84875014664
-
-
ITGlobal Consulting LTD
-
ITGlobal Consulting LTD, "RFID Toll Road Payment," http://www.itglobalconsulting.com/rfidtollroadpayment.asp, 2013
-
(2013)
RFID Toll Road Payment
-
-
-
28
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels, "RFID Security and Privacy: A Research Survey," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 381-394, Feb. 2006 (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
35
-
-
84875019105
-
Usability of display-equipped rfid tags for security purposes
-
A. Kobsa, R. Nithyanand, G. Tsudik, and E. Uzun, "Usability of Display-Equipped RFID Tags for Security Purposes," Proc. European Symp. Research in Computer Security (ESORICS), 2011
-
(2011)
Proc. European Symp. Research in Computer Security (ESORICS)
-
-
Kobsa, A.1
Nithyanand, R.2
Tsudik, G.3
Uzun, E.4
-
36
-
-
74049091231
-
EPc rfid tag security weaknesses and defenses: passport cards enhanced drivers licenses and beyond
-
K. Koscher, A. Juels, V. Brajkovic, and T. Kohno, "EPC RFID Tag Security Weaknesses and Defenses: Passport Cards Enhanced Drivers Licenses and Beyond," Proc. ACM Conf. Computer and Comm. Security, 2009
-
(2009)
Proc. ACM Conf. Computer and Comm. Security
-
-
Koscher, K.1
Juels, A.2
Brajkovic, V.3
Kohno, T.4
-
39
-
-
79957950088
-
Vibrate-to-unlock: mobile phone assisted user authentication to multiple personal rfid tags
-
N. Saxena, B. Uddin, J. Voris, and N. Asokan, "Vibrate-to-Unlock: Mobile Phone Assisted User Authentication to Multiple Personal RFID Tags," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), 2011
-
(2011)
Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom)
-
-
Saxena, N.1
Uddin, B.2
Voris, J.3
Asokan, N.4
-
50
-
-
84858390549
-
Design of a passively-powered programmable sensing platform for uhf rfid systems
-
A. Sample, D. Yeager, P. Powledge, and J. Smith, "Design of a Passively-Powered Programmable Sensing Platform for UHF RFID Systems," Proc. IEEE Int'l Conf. RFID, 2007
-
(2007)
Proc. IEEE Int'l Conf. RFID
-
-
Sample, A.1
Yeager, D.2
Powledge, P.3
Smith, J.4
-
51
-
-
84860658281
-
Still and silent: motion detection for enhanced rfid security and privacy without changing the usage model
-
June
-
N. Saxena and J. Voris, "Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model," Proc. Workshop RFID Security (RFIDSec), June 2010
-
(2010)
Proc. Workshop RFID Security (RFIDSec)
-
-
Saxena, N.1
Voris, J.2
-
54
-
-
85009517134
-
A wirelessly-powered platform for sensing and computation
-
J.R. Smith, P.S. Powledge, S. Roy, and A. Mamishev, "A Wirelessly-Powered Platform for Sensing and Computation," Proc. Eighth Int'l Conf. Ubiquitous Computing (UbiComp), 2006
-
(2006)
Proc. Eighth Int'l Conf. Ubiquitous Computing (UbiComp)
-
-
Smith, J.R.1
Powledge, P.S.2
Roy, S.3
Mamishev, A.4
-
55
-
-
84875034830
-
-
sparkfun 32 Channel San Jose Navigation GPS 5Hz Receiver with Antenna
-
sparkfun, "32 Channel San Jose Navigation GPS 5Hz Receiver with Antenna," http://www.sparkfun.com/products/8266, 2011
-
(2011)
-
-
-
56
-
-
80755144040
-
On the requirements for successful gps spoofing attacks
-
Oct.
-
N.O. Tippenhauer, C. Popper, K.B. Rasmussen, and S. Capkun, "On the Requirements for Successful GPS Spoofing Attacks," Proc. ACM Conf. Computer and Comm. Security (CCS '11), Oct. 2011
-
(2011)
Proc. ACM Conf. Computer and Comm. Security (CCS '11)
-
-
Tippenhauer, N.O.1
Popper, C.2
Rasmussen, K.B.3
Capkun, S.4
-
57
-
-
84875019286
-
-
U.S. Dept. of State The U.S. Electronic Passport
-
U.S. Dept. of State, "The U.S. Electronic Passport," http://travel.state.gov/passport/passport-2498.html, 2013
-
(2013)
-
-
-
60
-
-
84875027539
-
-
Washington State Dept. of Licensing
-
Washington State Dept. of Licensing, "Enhanced Driver License/ID Card," http://www.dol.wa.gov/about/news/priorities/edl.html, 2013.
-
(2013)
Enhanced Driver License/ID Card
-
-
|