참고문헌
- Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.4.
- Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.37.
- Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.5.
- Newitz, Annalee, "The RFID Hacking Underground", Wired Magazine, http://www.wired.com/wired/archive/14.05/rfid_pr.html
- Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.99.
- Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.12.
- Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.89.
- Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.73.
- Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.69.
- Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.91.
- http://www.rfid.averydennison.com/products.php#2
- Finkenzeller, Klaus, RFID Handbook, John Wiley & Sons, Chichester, West Sussex England, 2003, pp.13-20.
- Glover, Bill and Himanshu Bhatt, RFID Essentials, O'Reilly Media, Sebastopol CA, 2006, pp.72.
- "A Summary of RFID Standards", http://www.rfidjournal.com/article/view/1335/2
- Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.81.
- Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.112.
- Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.25,132
- RFID: The Next Generation Auto-ID Technology, http://www.mwjournal.com/Journal/RFID_Next_Generation_Auto_ID_Technology/AR_7232/
- Glover, Bill and Himanshu Bhatt, RFID Essentials, O'Reilly Media, Sebastopol CA, 2006, pp.72.
- Sweeney II, Patrick J., RFID for Dummies, Wiley Publishing, Hoboken NJ, 2005, pp.100.
- Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.297-363.
- "Are RFID Chips a Personal Security Risk?", http://www.smartertravel.com/travel-advice/are-rfidchips-personal-security-risk.html?id=2672576
- http://www.spychips.com/index.html
- Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.63.
- http://barcodereader.systemid.com/index.php/2010/09/24/wal-mart-uses-rfid-to-track-underwear/
- http://cq.cx/verichip.pl
- http://www.engadget.com/2008/03/19/rfid-credit-cards-easily-hacked-with-8-reader/
- http://www.youtube.com/watch?v=vmajlKJlT3U
- http://www.youtube.com/watch?v=NW3RGbQTLhE
- http://www.computerworld.com/s/article/9069558/How_they_hacked_it_The_MiFare_RFID_crack_explained
- RFID: Cloning vs. Spoofing, Bert Moore, http://www.aimglobal.org/members/news/templates/template.aspx?articleid=1564&zoneid=24
- http://www.thingmagic.com/rfid-security-issues
- http://www.rfidvirus.org/
- http://www.idstronghold.com/Secure-Sleeves-for-ID-Payment-Cards-IDSH1003-001-/productinfo/IDSH1003-001/
- http://www.pacsafe.com/www/index.php?_room=3&_action=detail&id=150
- http://www.vagabondish.com/flipside-rfid-protected-wallet/
- Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.276.
- Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.297.
- http://www.gizmag.com/go/5865/
- Jerry Banks, David Hanny, Manuel Pachano, Les Thompson, RFID Applied, Wiley, 2007, pp.279
- Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.343.
- Garfinkel, Simon and Beth Rosenberg, RFID Applications, Security, and Privacy, Addison-Wesley, 2006, pp.342.
- Kyuhee An, Kiyeal Lee, and Mokdong Chung, "Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos", International Journal of Information Processing Systems, Vol.2, No.3, December, 2006. https://doi.org/10.3745/JIPS.2006.2.3.170
- Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun and Byoungcheon Lee, "Security Framework for RFID-based Applications in Smart Home Environment", Journal of Information Processing Systems, Vol.7, No.1, March, 2011. https://doi.org/10.3745/JIPS.2011.7.1.111
- Dae-Hee Seo and Im-Yeong Lee, "A Study on RFID System with Secure Service Availability for Ubiquitous Computing", International Journal of Information Processing Systems, Vol.1, No.1, 2005. https://doi.org/10.3745/JIPS.2005.1.1.096
피인용 문헌
- Enabling Technologies for Green Internet of Things vol.11, pp.2, 2017, https://doi.org/10.1109/JSYST.2015.2415194
- Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing vol.10, pp.1, 2014, https://doi.org/10.1155/2014/389476
- “Solutions for RFID Smart Tagged Card Security Vulnerabilities” vol.4, 2013, https://doi.org/10.1016/j.aasri.2013.10.042
- Reliability and security of arbiter-based physical unclonable function circuits vol.26, pp.6, 2013, https://doi.org/10.1002/dac.2411
- Modeling RFID readers deployment in three-dimensional space vol.7, pp.2-3, 2016, https://doi.org/10.3233/RFT-150076
- Building a Smooth Medical Service for Operating Room Using RFID Technologies vol.2014, 2014, https://doi.org/10.1155/2014/984721