메뉴 건너뛰기




Volumn , Issue , 2012, Pages 236-244

Sensory-data-enhanced authentication for RFID-based access control systems

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRIC AUTHENTICATION; EXTENSIVE SIMULATIONS; INFORMATION EXCHANGES; IRIS IDENTIFICATION; ON-BOARD SENSORS; RESIDENTIAL ENVIRONMENT; SIMPLE ROTATION; STATIC IDENTIFICATIONS;

EID: 84877676693     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MASS.2012.6502522     Document Type: Conference Paper
Times cited : (16)

References (18)
  • 1
    • 70349286554 scopus 로고    scopus 로고
    • A capacitive touch interface for passive RFID tags
    • A. P. Sample, D. J. Yeager, and J. R. Smith, "A capacitive touch interface for passive RFID tags," in IEEE RFID, 2009.
    • (2009) IEEE RFID
    • Sample, A.P.1    Yeager, D.J.2    Smith, J.R.3
  • 2
    • 78650080956 scopus 로고    scopus 로고
    • Still and silent: Motion detection for enhanced RFID security and privacy without changing the usage model
    • N. Saxena and J. Voris, "Still and silent: motion detection for enhanced RFID security and privacy without changing the usage model," Radio Frequency Identification: Security and Privacy Issues, pp. 2-21, 2010.
    • (2010) Radio Frequency Identification: Security and Privacy Issues , pp. 2-21
    • Saxena, N.1    Voris, J.2
  • 3
    • 84877668527 scopus 로고    scopus 로고
    • A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems
    • December
    • D. Ma and N. Saxena, "A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems," Security and Communication Networks, December 2011.
    • (2011) Security and Communication Networks
    • Ma, D.1    Saxena, N.2
  • 4
    • 70349301622 scopus 로고    scopus 로고
    • RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
    • A. Czeskis, K. Koscher, J. R. Smith, and T. Kohno, "RFIDs and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications," in ACM CCS, 2008.
    • (2008) ACM CCS
    • Czeskis, A.1    Koscher, K.2    Smith, J.R.3    Kohno, T.4
  • 5
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels, "RFID security and privacy: A research survey," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, 2006. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 6
    • 38049075710 scopus 로고    scopus 로고
    • Shake well before use: Authentication based on accelerometer data
    • R. Mayrhofer and H. Gellersen, "Shake well before use: Authentication based on accelerometer data," Pervasive Computing, pp. 144-161, 2007.
    • (2007) Pervasive Computing , pp. 144-161
    • Mayrhofer, R.1    Gellersen, H.2
  • 9
    • 83455228782 scopus 로고    scopus 로고
    • Demo: WISP-based access control combining electronic and mechanical authentication
    • Y. Shu, J. Chen, F. Jiang, Y. Gu, Z. Dai, and T. He, "Demo: WISP-based access control combining electronic and mechanical authentication," in ACM SenSys, 2011.
    • (2011) ACM SenSys
    • Shu, Y.1    Chen, J.2    Jiang, F.3    Gu, Y.4    Dai, Z.5    He, T.6
  • 10
    • 60149096491 scopus 로고    scopus 로고
    • An empirical study of UHF RFID performance
    • M. Buettner and D. Wetherall, "An empirical study of UHF RFID performance," in ACM MobiCom, 2008.
    • (2008) ACM MobiCom
    • Buettner, M.1    Wetherall, D.2
  • 11
    • 70349757643 scopus 로고    scopus 로고
    • An RFID based system for monitoring free weight exercises
    • Acm
    • R. Chaudhri, J. Lester, G. Borriello, and Acm, "An RFID based system for monitoring free weight exercises," in ACM Sensys, 2008.
    • (2008) ACM Sensys
    • Chaudhri, R.1    Lester, J.2    Borriello, G.3
  • 12
    • 77954968837 scopus 로고    scopus 로고
    • On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
    • J. Gummeson, S. S. Clark, K. Fu, and D. Ganesan, "On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors," in ACM MobiSys, 2010.
    • (2010) ACM MobiSys
    • Gummeson, J.1    Clark, S.S.2    Fu, K.3    Ganesan, D.4
  • 15
    • 84877678886 scopus 로고    scopus 로고
    • Gesture recognition model based on 3D accelerations
    • J. Kong, H. Wang, and G. Zhang, "Gesture recognition model based on 3D accelerations," in IEEE ICCSE, 2009.
    • (2009) IEEE ICCSE
    • Kong, J.1    Wang, H.2    Zhang, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.