-
1
-
-
84941201897
-
RFID in animal-tracking applications
-
Floyd, R.E. RFID in animal-tracking applications. IEEE Potentials 2015, 34, 32-33.
-
(2015)
IEEE Potentials
, vol.34
, pp. 32-33
-
-
Floyd, R.E.1
-
3
-
-
77952652488
-
The electronic passport and the future of government-issued RFID-based identification
-
Grapevine, TX, USA, 26-28 March
-
Ezovski, G.M.; Watkins, S.E. The electronic passport and the future of government-issued RFID-based identification. In Proceedings of the IEEE International Conference on RFI, Grapevine, TX, USA, 26-28 March 2007; pp. 15-22.
-
(2007)
In Proceedings of the IEEE International Conference on RFI
, pp. 15-22
-
-
Ezovski, G.M.1
Watkins, S.E.2
-
4
-
-
84941206468
-
RFID in transportation
-
Floyd, R.E. RFID in transportation. IEEE Potentials 2015, 34, 19-21.
-
(2015)
IEEE Potentials
, vol.34
, pp. 19-21
-
-
Floyd, R.E.1
-
6
-
-
84987899023
-
RFID cardinality estimation method for intelligent warehouse
-
Chengdu, China, 27-29 July
-
Shen, J.; Tan, X.;Wu, F.; Yan, P. RFID cardinality estimation method for intelligent warehouse. In Proceedings of the 35th Chinese Control Conferenc, Chengdu, China, 27-29 July 2016; pp. 8468-8473.
-
(2016)
In Proceedings of the 35th Chinese Control Conferenc
, pp. 8468-8473
-
-
Shen, J.1
Tan, X.2
Wu, F.3
Yan, P.4
-
7
-
-
81155141920
-
Maritime Freight Container Management System Using RFID
-
Spain, 6-7 September
-
Barro-Torres, S.J.; Fernández-Caramés, T.M.; Gonález-López, M.; Escudero-Cascón, C.J. Maritime Freight Container Management System Using RFID. In Proceedings of the 3rd International EURASIP Workshop on RFID Technology, La Manga del Mar Menor, Spain, 6-7 September 2010.
-
(2010)
Proceedings of the 3rd International EURASIP Workshop on RFID Technology, La Manga del Mar Menor
-
-
Barro-Torres, S.J.1
Fernández-Caramés, T.M.2
Gonález-López, M.3
Escudero-Cascón, C.J.4
-
8
-
-
84869085980
-
Real-time personal protective equipment monitoring system
-
Barro-Torres, S.J.; Fernández-Caramés, T.M.; Pérez-Iglesias, H.J.; Escudero, C.J. Real-time personal protective equipment monitoring system. Comput. Commun 2012, 36, 42-50.
-
(2012)
Comput. Commun
, vol.36
, pp. 42-50
-
-
Barro-Torres, S.J.1
Fernández-Caramés, T.M.2
Pérez-Iglesias, H.J.3
Escudero, C.J.4
-
10
-
-
58049095462
-
The Research and Application of RFID Technologies in Highway’s Electronic Toll Collection System
-
Networking and Mobile Computing, Dalian, China, 12-17 October
-
Xu, G. The Research and Application of RFID Technologies in Highway’s Electronic Toll Collection System. In Proceedings of the 4th International Conference onWireless Communication, Networking and Mobile Computing, Dalian, China, 12-17 October 2008; pp. 1-4.
-
(2008)
In Proceedings of the 4th International Conference onWireless Communication
, pp. 1-4
-
-
Xu, G.1
-
12
-
-
84962859127
-
Integrated environment for testing IoT and RFID technologies applied on intelligent transportation system in Brazilian scenarios
-
Sao Paulo, Brazil, 25 September
-
Leal, A.G.; Santiago, A.; Miyake, M.Y.; Noda, M.K.; Pereira, M.J.; Avanço, L. Integrated environment for testing IoT and RFID technologies applied on intelligent transportation system in Brazilian scenarios. In Proceedings of the IEEE Brasil RFID, Sao Paulo, Brazil, 25 September 2014; pp. 22-24.
-
(2014)
In Proceedings of the IEEE Brasil RFID
, pp. 22-24
-
-
Leal, A.G.1
Santiago, A.2
Miyake, M.Y.3
Noda, M.K.4
Pereira, M.J.5
Avanço, L.6
-
13
-
-
84906261221
-
RFID Technology for IoT-Based Personal Healthcare in Smart Spaces
-
Amendola, S.; Lodato, R.; Manzari, S.; Occhiuzzi, C.; Marrocco, G. RFID Technology for IoT-Based Personal Healthcare in Smart Spaces. IEEE Internet Things J 2014, 1, 144-152.
-
(2014)
IEEE Internet Things J
, vol.1
, pp. 144-152
-
-
Amendola, S.1
Lodato, R.2
Manzari, S.3
Occhiuzzi, C.4
Marrocco, G.5
-
14
-
-
84934783840
-
On the design of smart parking networks in the smart cities: An optimal sensor placement model
-
Bagula, A.; Castelli, L.; Zennaro, M. On the design of smart parking networks in the smart cities: An optimal sensor placement model. Sensors 2015, 15, 15443-15467.
-
(2015)
Sensors
, vol.15
, pp. 15443-15467
-
-
Bagula, A.1
Castelli, L.2
Zennaro, M.3
-
15
-
-
84991018123
-
A review on internet of things for defense and public safety
-
Fraga-Lamas, P.; Fernández-Caramés, T.M.; Suárez-Albela, M.; Castedo, L.; González-López, M. A review on internet of things for defense and public safety. Sensors 2016, 16, 1644.
-
(2016)
Sensors
, vol.16
, pp. 1644
-
-
Fraga-Lamas, P.1
Fernández-Caramés, T.M.2
Suárez-Albela, M.3
Castedo, L.4
González-López, M.5
-
16
-
-
84953283640
-
Wireless sensors grouping proofs for medical care and ambient assisted-living deployment
-
Trcek, D. Wireless sensors grouping proofs for medical care and ambient assisted-living deployment. Sensors 2016, 16, 33.
-
(2016)
Sensors
, vol.16
, pp. 33
-
-
Trcek, D.1
-
17
-
-
84948672726
-
An intelligent power outlet system for the smart home of the internet of things
-
2015
-
Fernández-Caramés, T.M. An intelligent power outlet system for the smart home of the internet of things. Int. J. Distrib. Sens. Netw. 2015, 2015, 1.
-
(2015)
Int. J. Distrib. Sens. Netw
, pp. 1
-
-
Fernández-Caramés, T.M.1
-
18
-
-
84973124318
-
Accurate vehicle location system using RFID, an internet of things approach
-
Prinsloo, J.; Malekian, R. Accurate vehicle location system using RFID, an internet of things approach. Sensors 2016, 16, 825.
-
(2016)
Sensors
, vol.16
, pp. 825
-
-
Prinsloo, J.1
Malekian, R.2
-
19
-
-
84881049382
-
The survey of RFID attacks and defenses
-
Networking and Mobile Computing, Shanghai, China, 21-23 September
-
Li, H.; Chen, Y.; He, Z. The survey of RFID attacks and defenses. In Proceedings of the 8th International Conference on Wireless Communication, Networking and Mobile Computing, Shanghai, China, 21-23 September 2012; pp. 1-4.
-
(2012)
In Proceedings of the 8th International Conference on Wireless Communication
, pp. 1-4
-
-
Li, H.1
Chen, Y.2
He, Z.3
-
20
-
-
84897550904
-
RFID: An appraisal of malevolent attacks on RFID security system and its resurgence
-
Jaipur, India, 20-22 December
-
Pandian, M.T.; Sukumar, R. RFID: An appraisal of malevolent attacks on RFID security system and its resurgence. In Proceedings of the IEEE International Conference in MOOC Innovation and Technology in Education (MITE, Jaipur, India, 20-22 December 2013; pp. 17-20.
-
(2013)
In Proceedings of the IEEE International Conference in MOOC Innovation and Technology in Education (MITE
, pp. 17-20
-
-
Pandian, M.T.1
Sukumar, R.2
-
21
-
-
34548285839
-
Remote password extraction from RFID tags
-
Oren, Y. Remote password extraction from RFID tags. IEEE Trans. Comput 2007, 56, 1292-1296.
-
(2007)
IEEE Trans. Comput
, vol.56
, pp. 1292-1296
-
-
Oren, Y.1
-
22
-
-
84893081352
-
Reverse-engineering a cryptographic RFID tag
-
San José, CA, USA, 28 July-1 August
-
Nohl, K.; Evans, D.; Plötz, S.; Plötz, H. Reverse-engineering a cryptographic RFID tag. In Proceedings of the 17th USENIX Security Symposium, San José, CA, USA, 28 July-1 August 2008; pp. 185-193.
-
(2008)
In Proceedings of the 17th USENIX Security Symposium
, pp. 185-193
-
-
Nohl, K.1
Evans, D.2
Plötz, S.3
Plötz, H.4
-
23
-
-
71249139840
-
Contact-based fault injections and power analysis on RFID tags
-
Antalya, Turkey, 23-27 August
-
Hutter, M.; Schmidt, J.M; Plos, T. Contact-based fault injections and power analysis on RFID tags. In Proceedings of the European Conference on Circuit Theory and Desig, Antalya, Turkey, 23-27 August 2009; pp. 409-412.
-
(2009)
In Proceedings of the European Conference on Circuit Theory and Desig
, pp. 409-412
-
-
Hutter, M.1
Schmidt, J.M.2
Plos, T.3
-
24
-
-
67650661551
-
Power analysis of communication of RFID transponders with Password-Protected Memory
-
Gosier, France, 1-6 March
-
Vojtech, L.; Kahl, J. Power analysis of communication of RFID transponders with Password-Protected Memory. In Proceedings of the Eighth International Conference on Network, Gosier, France, 1-6 March 2009; pp. 116-120.
-
(2009)
In Proceedings of the Eighth International Conference on Network
, pp. 116-120
-
-
Vojtech, L.1
Kahl, J.2
-
25
-
-
84866700942
-
RFID communication: How well protected against reverse engineering?
-
Klaipeda City, Latvia, 10-12 July
-
Mednis, A.; Zviedris, R. RFID communication: How well protected against reverse engineering? In Proceedings of the Second International Conference on Digital Information Processing and Communications, Klaipeda City, Latvia, 10-12 July 2012; pp. 59-61.
-
(2012)
Proceedings of the Second International Conference on Digital Information Processing and Communications
, pp. 59-61
-
-
Mednis, A.1
Zviedris, R.2
-
26
-
-
84893852516
-
Secure e-health system on passive RFID: Outpatient clinic and emergency care
-
Yeh, K.-H.; Lo, N.-W.;Wu, T.-C.;Wang, C. Secure e-health system on passive RFID: Outpatient clinic and emergency care. Int. J. Distrib. Sens. Netw. 2013, 9, doi:10.1155/2013/752412.
-
Int. J. Distrib. Sens. Netw
, vol.2013
, pp. 9
-
-
Yeh, K.-H.1
Lo, N.-W.2
Wu, T.-C.3
Wang, C.4
-
27
-
-
84975287288
-
RFID-based attack scenarios in retailing, healthcare and sports
-
Suh, W.S.; Yoon, E.J.; Piramuthu, S. RFID-based attack scenarios in retailing, healthcare and sports. J. Inf. Priv. Sec 2013, 9, 4-17.
-
(2013)
J. Inf. Priv. Sec
, vol.9
, pp. 4-17
-
-
Suh, W.S.1
Yoon, E.J.2
Piramuthu, S.3
-
28
-
-
84905909895
-
T. Attacks and threats on the U-healthcare application withmobile agent
-
Kim, J. T. Attacks and threats on the U-healthcare application withmobile agent. Int. J. Sec. Appl 2014, 8, 59-66.
-
(2014)
Int. J. Sec. Appl
, vol.8
, pp. 59-66
-
-
Kim, J.1
-
29
-
-
84894381878
-
Radio Frequency Identification (RFID) in health care: Privacy and security concerns limiting adoption
-
Rosenbaum, B.P. Radio Frequency Identification (RFID) in health care: Privacy and security concerns limiting adoption. J. Med. Syst. 2014, 38, 19.
-
(2014)
J. Med. Syst
, vol.38
, pp. 19
-
-
Rosenbaum, B.P.1
-
30
-
-
34548145421
-
RFID Security Issues inMilitary Supply Chains
-
Reliability and Security, Vienna, Austria, 10-13 April
-
Xiao, Q.; Boulet, C.; Gibbons, T. RFID Security Issues inMilitary Supply Chains. In Proceedings of the International Conference on Availabilit, Reliability and Security, Vienna, Austria, 10-13 April 2007; pp. 599-605.
-
(2007)
In Proceedings of the International Conference on Availabilit
, pp. 599-605
-
-
Xiao, Q.1
Boulet, C.2
Gibbons, T.3
-
31
-
-
84860379103
-
RFID Technology, Security Vulnerabilities, and Countermeasures
-
1st ed.; Huo, Y., Jia F., Eds.; INTECH: Rijeka, Croatia
-
Xiao, Q.; Gibbons, T.; Lebrun, H. RFID Technology, Security Vulnerabilities, and Countermeasures. In Supply Chain the Way to Flat Organisation , 1st ed.; Huo, Y., Jia F., Eds.; INTECH: Rijeka, Croatia, 2009.
-
(2009)
Supply Chain the Way to Flat Organisation
-
-
Xiao, Q.1
Gibbons, T.2
Lebrun, H.3
-
32
-
-
84879448756
-
-
1st ed.; Huo, Y., Jia, F., Eds.; PennWell: Tulsa, OK, USA
-
Sen, D.; Sen, P.; Das, A. RFID for Energy & Utility Industries , 1st ed.; Huo, Y., Jia, F., Eds.; PennWell: Tulsa, OK, USA, 2009.
-
(2009)
RFID for Energy & Utility Industries
-
-
Sen, D.1
Sen, P.2
Das, A.3
-
33
-
-
84888171353
-
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
-
San Diego, CA, USA, 6-9 February
-
Francillon, A.; Danev, B.; Capkun, S. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2011), San Diego, CA, USA, 6-9 February 2011.
-
(2011)
Proceedings of the Network and Distributed System Security Symposium (NDSS 2011)
-
-
Francillon, A.1
Danev, B.2
Capkun, S.3
-
34
-
-
85061034567
-
Comprehensive Experimental Analyses of Automotive Attack Surfaces
-
San Francisco, CA, USA, 8-12 August
-
Checkoway, S.; McCoy, D.; Kantor, B.; Anderson, D.; Shacham, H.; Savage, S.; Koscher, K.; Czeskis, A.; Roesner, F.; Kohno, T. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In Proceedings of the 20th USENIX conference on Security, San Francisco, CA, USA, 8-12 August 2011.
-
(2011)
Proceedings of the 20th USENIX conference on Security
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
35
-
-
85007484320
-
An Automatic, Time-based, Secure Pairing Protocol for Passive RFID
-
Amherst, MA, USA, 26-28 June
-
Amariucai, G.T.; Bergman, C.; Guan, Y. An Automatic, Time-based, Secure Pairing Protocol for Passive RFID. In Proceedings of the 7th International Conference on RFID Security and Privacy, Amherst, MA, USA, 26-28 June 2011.
-
(2011)
Proceedings of the 7th International Conference on RFID Security and Privacy
-
-
Amariucai, G.T.1
Bergman, C.2
Guan, Y.3
-
36
-
-
84873054792
-
Integration of RFID and web service for assisted living
-
Unluturk, M.S.; Kurtel, K. Integration of RFID and web service for assisted living. J. Med. Syst 2012, 36, 2371-2377.
-
(2012)
J. Med. Syst
, vol.36
, pp. 2371-2377
-
-
Unluturk, M.S.1
Kurtel, K.2
-
37
-
-
85009073812
-
Smart cities: A survey on security concerns
-
Ijaz, S.; Shah, M.A.; Khan, A.; Ahmed, M. Smart cities: A survey on security concerns. Int. J. Adv. Comput. Sci. Appl 2016, 7, 612-625.
-
(2016)
Int. J. Adv. Comput. Sci. Appl
, vol.7
, pp. 612-625
-
-
Ijaz, S.1
Shah, M.A.2
Khan, A.3
Ahmed, M.4
-
39
-
-
79951482658
-
Semi-passive RFID development platform for implementing and attacking security tags
-
London, UK, 8-11 November
-
Feldhofer, M.; Aigner, M.; Baier, T.; Hutter, M.; Plos, T.; Wenger, E. Semi-passive RFID development platform for implementing and attacking security tags. In Proceedings of the International Conference for Internet Technology and Secured Transaction, London, UK, 8-11 November 2010; pp. 1-6.
-
(2010)
In Proceedings of the International Conference for Internet Technology and Secured Transaction
, pp. 1-6
-
-
Feldhofer, M.1
Aigner, M.2
Baier, T.3
Hutter, M.4
Plos, T.5
Wenger, E.6
-
40
-
-
84898314302
-
Addressing Covert Channel Attacks in RFID-Enabled Supply Chains
-
1st ed.; Miri, A., Ed.; IGI Global: Hershey, PA, USA
-
Chawla, K.; Robins, G. Addressing Covert Channel Attacks in RFID-Enabled Supply Chains. In Advanced Security and Privacy for RFID Technologies , 1st ed.; Miri, A., Ed.; IGI Global: Hershey, PA, USA, 2013.
-
(2013)
Advanced Security and Privacy for RFID Technologies
-
-
Chawla, K.1
Robins, G.2
-
41
-
-
84979204832
-
RFID in textile and clothing manufacturing: Technology and challenges
-
Nayak, R.; Singh, A.; Padhye, R.; Wang, L. RFID in textile and clothing manufacturing: Technology and challenges. Fash. Text. 2015, 2, 9.
-
(2015)
Fash. Text
, vol.2
, pp. 9
-
-
Nayak, R.1
Singh, A.2
Padhye, R.3
Wang, L.4
-
43
-
-
70350601194
-
Wirelessly pickpocketing a Mifare Classic card
-
Oakland, CA, USA, 17-20 May
-
Garcia, F.D.; van Rossum, P.; Verdult, R.; Schreur, R.W.Wirelessly pickpocketing a Mifare Classic card. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 17-20 May 2009; pp. 3-15.
-
(2009)
In Proceedings of the IEEE Symposium on Security and Privacy
, pp. 3-15
-
-
Garcia, F.D.1
van Rossum, P.2
Verdult, R.3
Schreur, R.W.4
-
44
-
-
74549123338
-
The dark side of security by obscurity and cloning Mifare Classic rail and building passes, anywhere, anytime
-
Milan, Italy, 7-10 July
-
Courtois, N. The dark side of security by obscurity and cloning Mifare Classic rail and building passes, anywhere, anytime. In Proceedings of the International Conference on Security and Cryptography, Milan, Italy, 7-10 July 2009.
-
(2009)
Proceedings of the International Conference on Security and Cryptography
-
-
Courtois, N.1
-
45
-
-
80053475909
-
Breaking Mifare DESFire MF3ICD40: Power analysis and templates in the real world
-
Oswald, D.; Paar, C. Breaking Mifare DESFire MF3ICD40: Power analysis and templates in the real world. Lect. Notes Comput. Sci 2011, 6917, 207-222.
-
(2011)
Lect. Notes Comput. Sci
, vol.6917
, pp. 207-222
-
-
Oswald, D.1
Paar, C.2
-
46
-
-
85034095719
-
Dismantling MIFARE card
-
Torremolinos, Spain, 6-8 October
-
Garcia, F.D.; Gans, G.K.; Muijrers, R.; Rossum, P.; Verdult, R.; Schreur, R.W.; Jacobs, B. Dismantling MIFARE card. In Proceedings of the European Symposium on Research in Computer Securit, Torremolinos, Spain, 6-8 October 2008; pp. 97-114.
-
(2008)
In Proceedings of the European Symposium on Research in Computer Securit
, pp. 97-114
-
-
Garcia, F.D.1
Gans, G.K.2
Muijrers, R.3
Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
-
47
-
-
84956970769
-
Research on authentication technology of agriculture products traceability system based on RFID
-
Wang, B.; Zhang, J.; Sun, X;Wang, N.; Zhao, Y.;Wang, F. Research on authentication technology of agriculture products traceability system based on RFID. Chem. Eng. Trans 2015, 46, 1357-1362.
-
(2015)
Chem. Eng. Trans
, vol.46
, pp. 1357-1362
-
-
Wang, B.1
Zhang, J.2
Sun, X.3
Wang, N.4
Zhao, Y.5
Wang, F.6
-
48
-
-
37149018890
-
A survey of lightweight-cryptography implementations
-
Eisenbarth, T.; Kumar, S. A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 2007, 24, 522-533.
-
(2007)
IEEE Des. Test Comput.
, vol.24
, pp. 522-533
-
-
Eisenbarth, T.1
Kumar, S.2
-
49
-
-
81255138613
-
Smart RFID reader protocol for malware detection
-
Artificial Intelligence, Networking and Parallel/Distributed Computing, Sydney, Australia, 6-8 July
-
Ray, B.; Huda, S.; Chowdhury, M.U. Smart RFID reader protocol for malware detection. In Proceedings of the 12th ACIS International Conference on Software Engineerin, Artificial Intelligence, Networking and Parallel/Distributed Computing, Sydney, Australia, 6-8 July 2011; pp. 64-69.
-
(2011)
In Proceedings of the 12th ACIS International Conference on Software Engineerin
, pp. 64-69
-
-
Ray, B.1
Huda, S.2
Chowdhury, M.U.3
-
51
-
-
85009167937
-
An effective intrusion detection approach for jamming attacks on RFID systems
-
Rosenheim, Germany, 22-23 October
-
Avanco, L.; Guelfi, A.E.; Pontes, E.; Silva, A.A.A.; Kofuji, S.T.; Zhou, F. An effective intrusion detection approach for jamming attacks on RFID systems. In Proceedings of the International EURASIP Workshop on RFID Technology (EURFID, Rosenheim, Germany, 22-23 October 2015; pp. 73-80.
-
(2015)
In Proceedings of the International EURASIP Workshop on RFID Technology (EURFID
, pp. 73-80
-
-
Avanco, L.1
Guelfi, A.E.2
Pontes, E.3
Silva, A.A.A.4
Kofuji, S.T.5
Zhou, F.6
-
52
-
-
84892421243
-
Ultra-lightweight mutual authentication protocols: Weaknesses and Countermeasures
-
Reliability and Security, Regensburg, Germany, 2-6 September
-
Bilal, Z.; Martin, K. Ultra-lightweight mutual authentication protocols: Weaknesses and Countermeasures. In Proceedings of the Eighth International Conference on Availabilit, Reliability and Security, Regensburg, Germany, 2-6 September 2013; pp. 304-309.
-
(2013)
In Proceedings of the Eighth International Conference on Availabilit
, pp. 304-309
-
-
Bilal, Z.1
Martin, K.2
-
53
-
-
85007128784
-
A methodology for evaluating security in commercial RFID systems
-
1st ed.; Crepaldi, P. C., Pimenta, T. C., Eds.; INTECH: Rijeka, Croatia
-
Fernández-Caramés, T.M.; Fraga-Lamas, P.; Suárez-Albela, M.; Castedo, L. A methodology for evaluating security in commercial RFID systems. In Radio Frequency Identification , 1st ed.; Crepaldi, P. C., Pimenta, T. C., Eds.; INTECH: Rijeka, Croatia, 2016.
-
(2016)
Radio Frequency Identification
-
-
Fernández-Caramés, T.M.1
Fraga-Lamas, P.2
Suárez-Albela, M.3
Castedo, L.4
-
54
-
-
32444435813
-
Radio frequency identification (RFID)
-
Roberts, C.M. Radio frequency identification (RFID). Comput. Sec 2006, 25, 18-26.
-
(2006)
Comput. Sec
, vol.25
, pp. 18-26
-
-
Roberts, C.M.1
-
55
-
-
69949188712
-
Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme
-
Indoor and Mobile Radio Communications, Cannes, France, 15-18 September
-
Lim, T.L.; Li, T. Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme. In Proceedings of the IEEE 19th International Symposium on Persona, Indoor and Mobile Radio Communications, Cannes, France, 15-18 September 2008; pp. 1-6.
-
(2008)
In Proceedings of the IEEE 19th International Symposium on Persona
, pp. 1-6
-
-
Lim, T.L.1
Li, T.2
-
56
-
-
84873819021
-
Unreconciled collisions uncover cloning attacks in anonymous RFID systems
-
Bu, K.; Liu, X.; Luo, J.; Xiao, B.; Wei, G. Unreconciled collisions uncover cloning attacks in anonymous RFID systems. IEEE Trans. Inf. Forensics Sec 2013, 8, 429-439.
-
(2013)
IEEE Trans. Inf. Forensics Sec
, vol.8
, pp. 429-439
-
-
Bu, K.1
Liu, X.2
Luo, J.3
Xiao, B.4
Wei, G.5
-
57
-
-
50949128855
-
RFID malware fragmentation attacks
-
Irvine, CA, USA, 19-23 May
-
Suliman, A.; Shankarapani, M.K.; Mukkamala, S.; Sung, A.H. RFID malware fragmentation attacks. In Proceedings of the International Symposium on Collaborative Technologies and System, Irvine, CA, USA, 19-23 May 2008; pp. 533-539.
-
(2008)
In Proceedings of the International Symposium on Collaborative Technologies and System
, pp. 533-539
-
-
Suliman, A.1
Shankarapani, M.K.2
Mukkamala, S.3
Sung, A.H.4
-
58
-
-
84958033989
-
Context-aware defenses to RFID unauthorized reading and relay attacks
-
Halevi, T.; Li, H.; Ma, D.; Saxena, N.; Voris, J.; Xiang, T. Context-aware defenses to RFID unauthorized reading and relay attacks. IEEE Trans. Emerg. Top. Comput 2013, 1, 307-318.
-
(2013)
IEEE Trans. Emerg. Top. Comput
, vol.1
, pp. 307-318
-
-
Halevi, T.1
Li, H.2
Ma, D.3
Saxena, N.4
Voris, J.5
Xiang, T.6
-
59
-
-
33747058795
-
Security implications in RFID and authentication processing framework
-
Ayoade, J. Security implications in RFID and authentication processing framework. Comput. Sec 2006, 25, 207-212.
-
(2006)
Comput. Sec
, vol.25
, pp. 207-212
-
-
Ayoade, J.1
-
62
-
-
70349451691
-
Confidence in smart token proximity: Relay attacks revisited
-
Hancke, G.P.; Mayes, K.E.; Markantonakis, K. Confidence in smart token proximity: Relay attacks revisited. Comput. Sec 2009, 28, 615-627.
-
(2009)
Comput. Sec
, vol.28
, pp. 615-627
-
-
Hancke, G.P.1
Mayes, K.E.2
Markantonakis, K.3
-
63
-
-
84947040044
-
A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system
-
Gope, P.; Hwang, T. A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput. Sec 2015, 55, 271-280.
-
(2015)
Comput. Sec
, vol.55
, pp. 271-280
-
-
Gope, P.1
Hwang, T.2
-
64
-
-
85007437981
-
-
Available online, (accessed on 1 November
-
RFIDiot OfficialWebpage. Available online: http://www.rfidiot.org (accessed on 1 November 2016).
-
(2016)
RFIDiot OfficialWebpage
-
-
-
65
-
-
85007469572
-
-
Available online, (accessed on 1 November
-
Proxmark 3 CommunityWebpage. Available online: http://www.proxmark.org (accessed on 1 November 2016).
-
(2016)
Proxmark 3 CommunityWebpage
-
-
-
66
-
-
85007484721
-
-
Available online, (accessed on 1 November
-
Tastic Official Webpage. Available online: http://www.bishopfox.com/resources/tools/rfid-hacking/ attack-tools (accessed on 1 November 2016).
-
(2016)
Tastic Official Webpage
-
-
-
67
-
-
85007441796
-
-
Available online, (accessed on 1 November
-
OpenPCD Reader. Available online: http://www.openpcd.org (accessed on 1 November 2016).
-
(2016)
-
-
-
68
-
-
85007484722
-
-
Available online, (accessed on 1 November
-
OpenPICC Tag Emulator. Available online: http://www.openpicc.org (accessed on 1 November 2016).
-
(2016)
-
-
-
69
-
-
85007473433
-
-
Available online, (accessed on 1 November
-
Chameleon Project. Available online: https://github.com/skuep/ChameleonMini/wiki (accessed on 1 November 2016).
-
(2016)
-
-
Project, C.1
-
70
-
-
85007412819
-
-
Available online, (accessed on 1 November
-
McAffe’s Proxbrute Webpage. Available online: http://www.mcafee.com/es/downloads/free-tools/ proxbrute.aspx (accessed on 1 November 2016).
-
(2016)
McAffe’s Proxbrute Webpage
-
-
-
71
-
-
85007412820
-
-
Available online, (accessed on 1 November
-
NFC Tools Library. Available online: http://nfc-tools.org (accessed on 1 November 2016).
-
(2016)
-
-
-
72
-
-
85007481270
-
-
Available online, (accessed on 1 November
-
RIDAC RFID Reverse-Engineering Methodology. Available online: https://www.ee.oulu.fi/research/ ouspg/RFID%20Reverse%20Engineering (accessed on 1 November 2016).
-
(2016)
-
-
-
73
-
-
85007469581
-
-
Available online, (accessed on 1 November
-
Open-Source RFID Audit Framework RIDAC. Available online: https://www.ee.oulu.fi/research/ouspg/ RIDAC (accessed on 1 November 2016).
-
(2016)
-
-
-
74
-
-
85007481266
-
-
Available online, (accessed on 1 November
-
FCC ID Search Webpage. Available online: https://www.fcc.gov/general/fcc-id-search-page (accessed on 1 November 2016).
-
(2016)
-
-
-
75
-
-
85007481264
-
-
Application Note; Agilent: Santa Clara, CA, USA
-
Using the Agilent N9322C Basic Spectrum Analyzer (BSA). Low Frequency RFID Tag Characterization ; Application Note; Agilent: Santa Clara, CA, USA, 2013.
-
(2013)
Low Frequency RFID Tag Characterization
-
-
-
76
-
-
85007498976
-
-
Available online, (accessed on 1 November
-
USRPWebpage. Available online: https://www.ettus.com (accessed on 1 November 2016).
-
(2016)
USRPWebpage
-
-
-
77
-
-
84982851401
-
Spectrum monitoring and demodulation using LabVIEW and USRP RIO software defined radio
-
Zonguldak, Turkey, 16-19 May
-
Kocatepe, Ü.; Için, O. Spectrum monitoring and demodulation using LabVIEW and USRP RIO software defined radio. In Proceedings of the 24th Signal Processing and Communication Application Conference (SIU, Zonguldak, Turkey, 16-19 May 2016; pp. 517-520.
-
(2016)
In Proceedings of the 24th Signal Processing and Communication Application Conference (SIU
, pp. 517-520
-
-
Kocatepe, Ü.1
Için, O.2
-
78
-
-
84946231594
-
Real-time blind spectrum sensing using USRP
-
Lisbon, Portugal, 24-27 May
-
Srivastava, S.; Hashmi, M.; Das, S.; Barua, D. Real-time blind spectrum sensing using USRP. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS, Lisbon, Portugal, 24-27 May 2015; pp. 986-989.
-
(2015)
In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS
, pp. 986-989
-
-
Srivastava, S.1
Hashmi, M.2
Das, S.3
Barua, D.4
-
79
-
-
84985026373
-
Hybrid spectrum sensing experimental analysis using GNU radio and USRP for cognitive radio
-
Brussels, Belgium, 25-28 August
-
Nafkha, A.; Naoues, M.; Cichony, K.; Kliks, A.; Aziz, B. Hybrid spectrum sensing experimental analysis using GNU radio and USRP for cognitive radio. In Proceedings of the International Symposium on Wireless Communication Systems (ISWCS, Brussels, Belgium, 25-28 August 2015; pp. 506-510.
-
(2015)
In Proceedings of the International Symposium on Wireless Communication Systems (ISWCS
, pp. 506-510
-
-
Nafkha, A.1
Naoues, M.2
Cichony, K.3
Kliks, A.4
Aziz, B.5
-
80
-
-
34247238287
-
Survey of automatic modulation classification techniques:Classical approaches and new trends
-
Dobre, O.A.; Abdi, A.; Bar-Ness, Y.; Su, W. Survey of automatic modulation classification techniques:Classical approaches and new trends. IET Commun 2007, 1, 137-156.
-
(2007)
IET Commun
, vol.1
, pp. 137-156
-
-
Dobre, O.A.1
Abdi, A.2
Bar-Ness, Y.3
Su, W.4
-
81
-
-
84863764554
-
Wavelet fingerprinting of radio-frequency identification (RFID) tags
-
Bertoncini, C.; Rudd, K.; Nousain, B.; Hinders, M.Wavelet fingerprinting of radio-frequency identification (RFID) tags. IEEE Trans. Ind. Electron 2012, 59, 4843-4850.
-
(2012)
IEEE Trans. Ind. Electron
, vol.59
, pp. 4843-4850
-
-
Bertoncini, C.1
Rudd, K.2
Nousain, B.3
Hinders, M.4
-
82
-
-
84987880397
-
DBN based automatic modulation recognition for ultra-low SNR RFID signals
-
Chengdu, China, 27-29 August
-
Ma, L.; Yang, Y.;Wang, H. DBN based automatic modulation recognition for ultra-low SNR RFID signals. In Proceedings of the 35th Chinese Control Conference (CCC, Chengdu, China, 27-29 August 2016; pp. 7054-7057.
-
(2016)
In Proceedings of the 35th Chinese Control Conference (CCC
, pp. 7054-7057
-
-
Ma, L.1
Yang, Y.2
Wang, H.3
-
83
-
-
85007477766
-
-
Available online, (accessed on 1 November
-
Myriad-RFWebpage. Available online: https://myriadrf.org (accessed on 1 November 2016).
-
(2016)
Myriad-RFWebpage
-
-
-
84
-
-
85007462861
-
-
Available online, (accessed on 1 November
-
HackRF One Webpage. Available online: https://greatscottgadgets.com/hackrf (accessed on 1 November 2016).
-
(2016)
-
-
-
85
-
-
84922456022
-
GenePrint: Generic and accurate physical-layer identification for UHF RFID tags
-
Han, J.; Qian, C.; Yang, P.; Ma, D.; Jiang, Z.; Xi,W.; Zhao, J. GenePrint: Generic and accurate physical-layer identification for UHF RFID tags. IEEE/ACM Trans. Netw 2016, 24, 846-858.
-
(2016)
IEEE/ACM Trans. Netw
, vol.24
, pp. 846-858
-
-
Han, J.1
Qian, C.2
Yang, P.3
Ma, D.4
Jiang, Z.5
Xi, W.6
Zhao, J.7
-
86
-
-
85009926791
-
Efficient physical-layer unknown tag identification in large-scale RFID systems
-
Zhu, F.; Xiao, B.; Liu, J.; Chen, L.J. Efficient physical-layer unknown tag identification in large-scale RFID systems. IEEE Trans. Commun. 2016 , PP, 1.
-
IEEE Trans. Commun. 2016
, pp. 1
-
-
Zhu, F.1
Xiao, B.2
Liu, J.3
Chen, L.J.4
-
87
-
-
85007445596
-
-
Available online, (accessed on 1 November
-
HIDWebpage. Available online: http://www.hidglobal.com (accessed on 1 November 2016).
-
(2016)
HIDWebpage
-
-
-
89
-
-
85007473806
-
-
Available online, (accessed on 1 November
-
NXP’s Official Webpage. Available online: http://www.nxp.com (accessed on 1 November 2016).
-
(2016)
NXP’s Official Webpage
-
-
-
90
-
-
0007323756
-
-
ISO/IEC 11784:1996; ISO: Geneva, Switzerland
-
International Organization for Standardization (ISO). Radio Frequency Identification of Animals-Code Structure ; ISO/IEC 11784:1996; ISO: Geneva, Switzerland, 1996.
-
(1996)
Radio Frequency Identification of Animals-Code Structure
-
-
|