References
- Avoine G., and Oechslin P., "RFID Traceability: A Multilayer Problem," Financial Cryptography - FC'05, LNCS, Springer, 2005
- RFID Journal. Gillette to Purchase 500 Million EPC Tags, http://www.Iiidjournal.com
- Bono, S., Green, M,., Stubblefield, A., Julels, A., Rubin, A., and Szydlo, M., "Security Analysis of a Cryptographically-Enabled RFID Device," In USENIX Security, 2005. (Available at http://rfidanalysis.org/.)
- Castro, Miguel and Barbara Liskov, "Practical Byzantine Fault Tolerance," Operating Systems Design and Implementation, 1999, (http://www.pmg.lcs.mit.edu/~castro/osdi99_html/osdi99.html)
- Junichiro S., Jae-Cheol R and Kouichi S., "Enhancing privacy of Universal Reencryption scheme for RFID Tags," EUC 2004, vol.3207 LNCS, pp.879-890, Dec. 2004
- MIT Auto-ID Center. http://www.autoidcenter.org
- Su-Mi L., Young-Ju H., Dong-Hoon L., and Jong L., "Efficient Authentication for Low-Cost RFID systems," ICCSA05, vol.3480 LCNS, pp.619-629, May 2005
- Stephen A. Weis, Sanjay E.Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," First International Conference on Security in Pervasive Computing, 2003. http://theory.lcs.mit.edu/sweis/spcIiid.pdf
- Dimitriou T., "A lightweight Iiid protocol to protect against traceability and cloning attacks," IEEE, SECURECOMM, 2005
- Gilbert, H., Sibert, H., and Robshaw, M., "An Active Attack Against a Provably Secure Lightweignt Authentication Protocol," Preliminary Version, 2005
- Hung-Yu Chien and Che-Hao Chen, "Mutulaauthentication protocol for RFID conforming to EPC Class 1 Generation 2 Standards," Computer Standards & Interfaces, vol.29, pp.254-259, Feb., 2007 https://doi.org/10.1016/j.csi.2006.04.004
- Stephen A. Weis, "Security and Privacy in RadioFrequency Identification Devices," Masters Thesis. MIT. May, 2003
- Sanjay E.Sarma, "Towards the five-cent Tag," Technical Report MIT-AUTOID-WH006, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org
- Juels A., "Minimalist cryptography for Low-Cost RFID Tag," In The Fourth International Conference on Security in Communication Networks-SCN 2004, vol.3352, LNCS, pp.149-164, Sep. 2004
- Juels A., "Authentication Pervasive Devices with Human Protocols," Crypto 2005, Aug. 205.
- Jeong-kyu Y., Ren K, and Kwan-gio K, "Security and Privacy on Authentication Protocol for Low-cost RFID," Symposium on Cryptography and Information Security, Jan., 2005
- Ohkubo M., Suzuki K, and Kinoshita S., "Cryptographic Approach to "Privacy-Friendly" Tag" RFID Privacy Workshop@MIT, Nov, 2003
- Bringer J, Chabanne H., and Dottax E., "HB++ : a Lightweight Authentication Protocol Secure Against Some Attacks," IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, 2006
- Henrici D., and Paul M., "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers," PerSee'04 at IEEE PerCom. pp.149-153, 2004
- Jules A., and Pappu R, Squealing E., "Privacy protection in RFID-enabled banknotes, In processing of Financial Cryptography," FC'03, vol.2742 LNCS, pp.103-121, Sep 2003
- D.N. Due, J. Park, H. Lee and K Kim, "Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning," The 2006 Symposium on Cryptography and Information Security, 2006
- Katz J., and Ji-Sun S., "Prallel and Concurrent Security of the HB and HB+ Protocols," Cryptology ePrint Archive: Report 2005/461 (to appear in the preceedings of Eurocrypt 2006)
- D-H, Seo, I-Y Lee, "A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment," Journal of the Korean Institute of Information Security and Criptology, vol.16, no.2, pp.81-94, 2006
- Kideok Cho, Sangheon Pack, Taekyoung Kwon, and Yanghee Choi, "SRMS: SIP-based RFID Management System," in Proc. IEEE International Conference on Pervasive Services (ICPS) 2007, Istanbul, Turkey, July 2007