-
1
-
-
30344439619
-
-
Addison Wesley, ISBN 0-321-29096-8
-
Garfinkel, S. and Rosenberg, B, "RFID: Applications, Security and Privacy", Addison Wesley, ISBN 0-321-29096-8, 2005.
-
(2005)
RFID: Applications, Security and Privacy
-
-
Garfinkel, S.1
Rosenberg, B.2
-
2
-
-
38049028027
-
-
IETF RFC 4269 IETF(The Internet Engineering Task Force)
-
IETF RFC 4269, "The SEED encryption algorithm", IETF(The Internet Engineering Task Force), 2005.
-
(2005)
The SEED Encryption Algorithm
-
-
-
3
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
Washington DC., USA, October
-
th ACM Conference on Computer and Communications Security(CCS 2003), pp. 103-111, Washington DC., USA, October, 2003.
-
(2003)
th ACM Conference on Computer and Communications Security(CCS 2003)
, pp. 103-111
-
-
Juels, A.1
Rivest R., .L.2
Szydlo, M.3
-
4
-
-
84860200406
-
A Study of a Valid Frequency Range using Correlation Analysis of Throat Signal
-
Jung YG, Han MS, Chung KY, Lee SJ (2011) A Study of a Valid Frequency Range using Correlation Analysis of Throat Signal. In:formation-An International Interdisciplinary Journal 14(11):3791-3799
-
(2011)
Information-An International Interdisciplinary Journal
, vol.14
, Issue.11
, pp. 3791-3799
-
-
Jung, Y.G.1
Han, M.S.2
Chung, K.Y.3
Lee, S.J.4
-
5
-
-
55849108689
-
A Study on the RFID Tag Encryption using Fast SEED
-
Greece
-
Ko H, Kim J, Jung J, Joe S, Lee Y, Chang Y, Lee K (2007) A Study on the RFID Tag Encryption using Fast SEED, ICCMSE2007 Corfu, Greece, 571-574
-
(2007)
ICCMSE2007 Corfu
, pp. 571-574
-
-
Ko, H.1
Kim, J.2
Jung, J.3
Joe, S.4
Lee, Y.5
Chang, Y.6
Lee, K.7
-
6
-
-
84895059451
-
-
mCloak
-
mCloak, http://www.mobilecloak.com, 2003.
-
(2003)
-
-
-
8
-
-
38049070732
-
Variable ID scheme of anonymity in RFID tags
-
Sendai, Japan
-
Saito J, Sakurai K (2004) Variable ID scheme of anonymity in RFID tags, Proceedings of the 2004 Symposium on Cryptography and Information Security, Vol. 1, pp. 713-718, Sendai, Japan
-
(2004)
Proceedings of the 2004 Symposium on Cryptography and Information Security
, vol.1
, pp. 713-718
-
-
Saito, J.1
Sakurai, K.2
-
9
-
-
84860179007
-
Localized approximation method using inertial compensation in WSNs
-
Song CW, Chung KY, Jung JJ, Rim KW, Lee JH (2011) Localized Approximation Method Using Inertial Compensation in WSNs. In:formation - An International Interdisciplinary Journal 14(11):3591-3600
-
(2011)
Information - An International Interdisciplinary Journal
, vol.14
, Issue.11
, pp. 3591-3600
-
-
Song, C.W.1
Chung, K.Y.2
Jung, J.J.3
Rim, K.W.4
Lee, J.H.5
-
11
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Lecture Notes in Computer Science 2802, Springer-Verlag
-
Weis SA, Sarma SE, Rivest RL, Engels DW (2003) Security and privacy aspects of low-cost radio frequency identification systems, First International Conference on Security in Pervasive Computing, pp.201-202, Lecture Notes in Computer Science 2802, Springer-Verlag
-
(2003)
First International Conference on Security in Pervasive Computing
, pp. 201-202
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|