References
- S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, 'Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems', Security in Pervasive Computing 2003, LNCS 2802, pp.201-212, Springer-Verlag Heidelberg, 2004 https://doi.org/10.1007/b95124
- S. E. Sarma, S. A. Weis, and D. W. Engels, 'RFID Systems and Security and Privacy Implications', CHES 2002, LNCS 2523, pp.454-469, Springer-Verlag Heidelberg, 2003
- S. E. Sarma, S. A. Weis, D. W. Engels. 'RFID systems, Security & Privacy Implications', White Paper MIT-AUTOID-WH-014, MIT AUTO-ID CENTER, 2002
- S. A. Weis, 'Security an Privacy in Radio-Frequency Identification Devices' MS Thesis. MIT. May, 2003
- A. Jueis, R. Pappu, 'Squealing Euros : Privacy protection in RFID-enabled banknotes', Financial Cryptography'03, LNCS 2742, pp.103-121, Springer-Verlag Heidelberg, 2003
- A. Juels, R. L. Rivest, M Szydlo, 'The Blocker Tag: Selective Blocking of FRID Tage for consumer Privacy', Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp.103-111, ACM Press, 2003
- M. Ohkubo, K. Suzuki, and S. Kinoshita, 'Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID', Proceedings of the SCIS 2004, pp.719-724, 2004
- D. Henrici, and P. Muller, 'Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers', Procedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops(PERCOMW'04), pp.149-153, IEEE, 2004 https://doi.org/10.1109/PERCOMW.2004.1276922
- mCloak : Personal/corporate management of wireless devices and technology, 2003. http://www.mobilecloak.com
- 황영주, 이수미, 이동훈, 임종인, '유비쿼터스 환경의 Low-Cost RFID 인증 프로토콜', 한국정보보호학회 하계정보보호학술대회 논문집 Vol.14, No.1, pp.109-114, 2004
- S. E. Sarma, S. A. Weis, and D. W. Engels, 'RadioFrequency Identicication : Secure Risks and challenges', RSA Laboratories Cryptobytes, Vol.6, No.1, pp.2-9, Spring 2003
- J. D. Touch, 'Performance Analysis of MD5', Proceedings of the confernce on Applications, technologies, architectures, and protocols for computer communication, (SIGCOMM'95), pp.77-86, ACM Press, 1995 https://doi.org/10.1145/217382.217414
- M. Y. Wang, C. P. Su, C. T. Huang, and C. W. Wu,'An HMAC processor with integrated SHA-1 and MD5 algorithms', Proceedings of the 2004 conference on Asia South Pacific design automation: electronic design and solution fair 2004, pp.456-458, IEEE Press, 2004
Cited by
- Energy-aware and load-balancing cluster routing protocol for wireless sensor networks in long-narrow region vol.31, pp.4, 2016, https://doi.org/10.3233/JIFS-169066
- Design and Implementation of A PC Protection using RF Transmitter-Receiver vol.10, pp.2, 2009, https://doi.org/10.5762/KAIS.2009.10.2.287