参考文献
|
-
A. Juels(2006).RFID Security and Privacy: A Research Survey.IEEE Journal on Selected Areas in Communications,24(2)
-
D. Henrici,P. Muller(2004).Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identfiers.Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops,149-153.
-
D. Ranasinghe, D. Engels,P. Cole(2004).Security and Privacy: Modest Proposals for Low-Cost RFID Systems.Auto-ID Labs Research Workshop
-
H. Knospe,H. Pohl(2004).RFID Security.Information Security Technical Report,9(4)
-
H. Y. Chien(2006).Secure Access Control Schemes for RFID Systems with Anonymity.Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006),96.
-
I. Vajda,L. Buttyán(2003).Lightweight authentication protocols for low-cost RFID tags.Workshop on Security in Ubiquitous Computing
-
J. Yang(2005).A Thesis for the Degree of Master of Science.School of Engineering Information and Communications University.
-
J. Yang,J. Park,H. Lee,K. Ren,K. Kim(2005).Mutual Authentication Protocol for Low-Cost RFID.Handout of the Ecrypt Workshop on RFID and Lightweight Crypto.
-
K. Yüksel(2004).Master`s Thesis, Dept. of Electronical Engineering, WPI.Dept. of Electronical Engineering, WPI.
-
M. Feldhofer,S. Dominikus,J. Wolkerstorfer(2004).Strong Authentication for RFID Systems using the AES Algorithm.Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004),357-370.
-
科學人雜誌2004年2月號
-
S. A. Weis(2003).MIT.
-
S. C. Bono,M. Green,A. Stubblefield,A. Juels(2005).Security Analysis of a Cryptographically- Enabled RFID Device.Proceedings of the USENIX Security Symposium.
-
S. Dominikus,E. Oswald,M. Feldhofer(2004).ECRYPT Workshop on RFID and Lightweight Crypto.Graz, Austria:
-
S. E. Sarma,S. A. Weis,D.W. Engels.(2003).Radio-Frequency-Identification Security Risks and Challenges.RSA Laboratories CryptoBytes,6(1)
-
White Paper
-
S. Weis, S. Sarma, R. Rivest,D. Engels(2003).Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems.1st International Conference on Security in Pervasive Computing (SPC),Germany:
-
Y. Hwang,S. Lee,D. Lee,J. Lim(2004).Proceedings of Conference on Information Security and Cryptology-Summer (CISC-S`04).Korean:
-
黃馨儀(2006).防偽技術優勢比較及技術移轉模式的評估.跨領域科技管理研習班受訓心得報告.
-
RFID Global新聞消息討論區
|