-
2
-
-
85076302457
-
-
IBM JCOP family. ftp://ftp.software.ibm.com/software/ pervasive/info/JCOP Family.pdf.
-
IBM JCOP Family
-
-
-
3
-
-
85076291301
-
-
ICAO. http://www.icao.int/.
-
-
-
-
6
-
-
26444478592
-
RFID traceability: A multilayer problem
-
A. Patrick and M. Yung, Eds.,. of LNCS
-
AVOINE, G., AND OECHSLIN, P. RFID traceability: A multilayer problem. In Financial Cryptography (2005), A. Patrick and M. Yung, Eds., vol. 3570 of LNCS, pp. 125–140.
-
(2005)
Financial Cryptography
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
8
-
-
10044297649
-
-
Springer
-
BOLLE, R., CONNELL, J., PANKANTI, S., RATHA, N., AND SENIOR, A. Guide to Biometrics. Springer, 2003.
-
(2003)
Guide to Biometrics
-
-
Bolle, R.1
Connell, J.2
Pankanti, S.3
Ratha, N.4
Senior, A.5
-
9
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
BRIK, V., BANERJEE, S., GRUTESER, M., AND OH, S. Wireless device identification with radiometric signatures. In Proc. ACM MobiCom (2008).
-
(2008)
Proc. ACM MobiCom
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
10
-
-
0030135340
-
Effects of high-pass and low-pass spatial filtering on face identification
-
COSTEN, N., PARKER, D., AND CRAW, I. Effects of high-pass and low-pass spatial filtering on face identification. Perception & Psychophysics 58, 4 (1996), 602–612.
-
(1996)
Perception & Psychophysics
, vol.58
, Issue.4
, pp. 602-612
-
-
Costen, N.1
Parker, D.2
Craw, I.3
-
11
-
-
70549106758
-
Transient-based identification of wireless sensor nodes
-
DANEV, B., AND ČAPKUN, S. Transient-based identification of wireless sensor nodes. In Proc. ACM/IEEE IPSN (2009).
-
(2009)
Proc. ACM/IEEE IPSN
-
-
Danev, B.1
Čapkun, S.2
-
12
-
-
49049105769
-
Design and implementation of PUF-based”unclonable” RFID ICs for anti-counterfeiting and security applications
-
DEVADAS, S., SUH, E., PARAL, S., SOWELL, R., ZIOLA, T., AND KHANDELWAL, V. Design and implementation of PUF-based”unclonable” RFID ICs for anti-counterfeiting and security applications. Proc. IEEE Intl. Conf. on RFID (2008), 58–64.
-
(2008)
Proc. IEEE Intl. Conf. On RFID
, pp. 58-64
-
-
Devadas, S.1
Suh, E.2
Paral, S.3
Sowell, R.4
Ziola, T.5
Khandelwal, V.6
-
13
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
DIMITRIOU, T. A lightweight RFID protocol to protect against traceability and cloning attacks. In Proc. ICST SecureComm (2005).
-
(2005)
Proc. ICST SecureComm
-
-
Dimitriou, T.1
-
14
-
-
33751513718
-
Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
-
DUC, D. N., PARK, J., LEE, H., AND KIM, K. Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. In Proc. Symposium on Cryptography and Information Security (2006).
-
(2006)
Proc. Symposium on Cryptography and Information Security
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
15
-
-
0035388827
-
Characteristics of radio transmitter fingerprints
-
ELLIS, K., AND SERINKEN, N. Characteristics of radio transmitter fingerprints. Radio Science 36 (2001), 585–597.
-
(2001)
Radio Science
, vol.36
, pp. 585-597
-
-
Ellis, K.1
Serinken, N.2
-
16
-
-
70349363627
-
-
EPCGLOBAL. Architecture framework v. 1.2. standard, 2007. http://www.epcglobalinc.org/standards/architecture/architecture 1 2-framework-20070910.pdf.
-
(2007)
Architecture Framework V. 1.2. Standard
-
-
-
17
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
M. Joye and J.-J. Quisquater, Eds.,. of LNCS
-
FELDHOFER, M., DOMINIKUS, S., AND WOLKERSTORFER, J. Strong authentication for RFID systems using the AES algorithm. In Workshop on Cryptographic Hardware and Embedded Systems (2004), M. Joye and J.-J. Quisquater, Eds., vol. 3156 of LNCS, pp. 357–370.
-
(2004)
Workshop on Cryptographic Hardware and Embedded Systems
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
18
-
-
85076298790
-
Cloning ePassports without active authentication
-
GRUNWALD, L. Cloning ePassports without active authentication. In BlackHat (2006).
-
(2006)
BlackHat
-
-
Grunwald, L.1
-
20
-
-
11144331561
-
Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
-
HALL, J., BARBEAU, M., AND KRANAKIS, E. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In Proc. CIIT (2004).
-
(2004)
Proc. CIIT
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
22
-
-
38049181728
-
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
-
HALL, J., BARBEAU, M., AND KRANAKIS, E. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting. In Proc. CCN (2006).
-
(2006)
Proc. CCN
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
23
-
-
0030357161
-
Wavelet based transmitter identification
-
HIPPENSTIEL, R., AND PAYAL, Y. Wavelet based transmitter identification. In Proc. ISSPA (1996).
-
(1996)
Proc. ISSPA
-
-
Hippenstiel, R.1
Payal, Y.2
-
24
-
-
0033220737
-
Combining multiple matchers for a high security fingerprint verification system
-
JAIN, A., PRABHAKAR, S., AND CHEN, S. Combining multiple matchers for a high security fingerprint verification system. In Pattern Recognition Letters (1999).
-
(1999)
Pattern Recognition Letters
-
-
Jain, A.1
Prabhakar, S.2
Chen, S.3
-
25
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
C. Blundo and S. Cimato, Eds.,. of LNCS
-
JUELS, A. Minimalist cryptography for low-cost RFID tags. In Intl. Conf. on Security in Communication Networks (2004), C. Blundo and S. Cimato, Eds., vol. 3352 of LNCS, pp. 149–164.
-
(2004)
Intl. Conf. On Security in Communication Networks
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
28
-
-
77951595476
-
Unidirectional key distribution across time and space with applications to RFID security
-
JUELS, A., PAPPU, R., AND PARNO, B. Unidirectional key distribution across time and space with applications to RFID security. In Proc. 17th USENIX Security Symposium (2008), pp. 75–90.
-
(2008)
Proc. 17th USENIX Security Symposium
, pp. 75-90
-
-
Juels, A.1
Pappu, R.2
Parno, B.3
-
29
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
JUELS, A., RIVEST, R., AND SZYDLO, M. The blocker tag: Selective blocking of RFID tags for consumer privacy. In Proc. ACM CCS (2003), pp. 103–111.
-
(2003)
Proc. ACM CCS
, pp. 103-111
-
-
Juels, A.1
Rivest, R.2
Szydlo, M.3
-
31
-
-
70349157643
-
RFID-based supply chain partner authentication and key agreement
-
KERSCHBAUM, F., AND SORNIOTTI, A. RFID-based supply chain partner authentication and key agreement. In Proc. ACM WiSec (2009).
-
(2009)
Proc. ACM WiSec
-
-
Kerschbaum, F.1
Sorniotti, A.2
-
32
-
-
0032021555
-
On combining classifiers
-
KITTLER, J., HATEF, M., DUIN, R., AND MATAS, J. On combining classifiers. IEEE Trans. on Pattern Analysis and Machine Intelligence 20, 3 (1998).
-
(1998)
IEEE Trans. On Pattern Analysis and Machine Intelligence
, vol.20
, pp. 3
-
-
Kittler, J.1
Hatef, M.2
Duin, R.3
Matas, J.4
-
33
-
-
85076294654
-
Reading ePassports with predictable document numbers
-
LAURIE, A. Reading ePassports with predictable document numbers. In news report (2006).
-
(2006)
News Report
-
-
Laurie, A.1
-
34
-
-
85076301379
-
Cloning ePassports with active authentication enabled
-
M, W. Cloning ePassports with active authentication enabled. In What The Hack (2005).
-
(2005)
What the Hack
-
-
-
36
-
-
0032634932
-
Computing the discrete-time analytic signal via FFT
-
MARPLE, S. Computing the discrete-time analytic signal via FFT. IEEE Trans. on Signal Processing 47, 9 (1999).
-
(1999)
IEEE Trans. On Signal Processing
, vol.47
, pp. 9
-
-
Marple, S.1
-
38
-
-
0003513556
-
-
2nd ed. Prentice-Hall Signal Processing Series
-
OPPENHEIM, A., SCHAFER, R., AND BUCK, J. Discrete-Time Signal Processing, 2nd ed. Prentice-Hall Signal Processing Series, 1998.
-
(1998)
Discrete-Time Signal Processing
-
-
Oppenheim, A.1
Schafer, R.2
Buck, J.3
-
40
-
-
51349157157
-
Implications of radio fingerprinting on the security of sensor networks
-
RASSMUSSEN, K., AND CAPKUN, S. Implications of radio fingerprinting on the security of sensor networks. In Proc. SecureComm (2007).
-
(2007)
Proc. SecureComm
-
-
Rassmussen, K.1
Capkun, S.2
-
42
-
-
21244457881
-
Multimodal biometrics: An overview
-
ROSS, A., AND JAIN, A. Multimodal biometrics: An overview. In Proc. EUSIPCO (2004).
-
(2004)
Proc. EUSIPCO
-
-
Ross, A.1
Jain, A.2
-
43
-
-
1242298616
-
Improvement of transmitter identification system for low SNR transients
-
TEKBAS, O., URETEN, O., AND SERINKEN, N. Improvement of transmitter identification system for low SNR transients. In Electronic Letters (2004).
-
(2004)
Electronic Letters
-
-
Tekbas, O.1
Ureten, O.2
Serinken, N.3
-
44
-
-
0029461389
-
Transient analysis and genetic algorithms for classification
-
TOONSTRA, J., AND KISNER, W. Transient analysis and genetic algorithms for classification. In Proc. IEEE WESCANEX (1995).
-
(1995)
Proc. IEEE WESCANEX
-
-
Toonstra, J.1
Kisner, W.2
-
47
-
-
85076311702
-
EPassports reloaded
-
VANBEEK, J. ePassports reloaded. In BlackHat (2008).
-
(2008)
BlackHat
-
-
Vanbeek, J.1
-
48
-
-
71049133194
-
Identification of the defective transmission devices using the wavelet transform
-
WANG, B., OMATU, S., AND ABE, T. Identification of the defective transmission devices using the wavelet transform. IEEE PAMI 27, 6 (2005), 696–710.
-
(2005)
IEEE PAMI
, vol.27
, Issue.6
, pp. 696-710
-
-
Wang, B.1
Omatu, S.2
Abe, T.3
|