References
- EPCglobal Inc., http://www.EPCglobalinc.org
- EPCglobal Ratified Specification, “The EPCglobal Architecture Framework,” 2009. http://www.epcglobalinc.org/standards/
- EPCglobal Ratified Standard, “EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz - 960MHz Version 1.2.0,” 2008. http://www.epcglobalinc.org/standards/
- Impinj RFID Technology Series Whitepaper, “UHF Gen 2 for Item-Level Tagging,” REV 1.0 02-06, February 2006, http://www.impinj.com/files/MR_GP_ED_00003_ILT.pdf
- Internet Engineering Task Force (IETF), Network Working Group, and E. Rescorla, “HTTP Over TLS,” RFC2818, http://tools.ietf.org/html/rfc2818, 2000.
- ISO/IEC 18092, “Near Field Communication Interface and Protocol (NFCIP-1),” http://www.iso.org/iso/catalogue_detail.htm?csnumber=38578
- Juels, A. (2005), RFID Security and Privacy: A Research Survey, RSA Laboratories.
- Klaus, F., RFID Handbook - Fundamentals and Applications in Contactless Smart Cards and Identification,, 2nd Edition, John Wiley & Sons, 2003, ISBN-13: 978-0470844021.
- VeriSign, The EPCglobal Network: Enhancing the Supply Chain, White Paper 2005, http://www.verisign.com/stellent/groups/public/documents/white_paper/002109.pdf
Cited by
- Improving Smart Home Security: Integrating Logical Sensing Into Smart Home vol.17, pp.13, 2017, https://doi.org/10.1109/JSEN.2017.2705045
- A Survey of RFID Deployment and Security Issues vol.7, pp.4, 2011, https://doi.org/10.3745/JIPS.2011.7.4.561
- UFLE: a user-friendly location-free encryption system for mobile users 2012, https://doi.org/10.1002/sec.615
- Reliability and security of arbiter-based physical unclonable function circuits vol.26, pp.6, 2013, https://doi.org/10.1002/dac.2411
- Building a Smooth Medical Service for Operating Room Using RFID Technologies vol.2014, 2014, https://doi.org/10.1155/2014/984721
- An object-based middleware supporting efficient interoperability on a smart home network vol.63, pp.1, 2013, https://doi.org/10.1007/s11042-011-0926-7
- A novel user authentication scheme with anonymity for wireless communications 2012, https://doi.org/10.1002/sec.601
- User Localization in Complex Environments by Multimodal Combination of GPS, WiFi, RFID, and Pedometer Technologies vol.2014, 2014, https://doi.org/10.1155/2014/814538
- Multipoint-to-point communications for SHE surveillance with QoS and QoE management vol.25, pp.7, 2012, https://doi.org/10.1016/j.engappai.2012.03.019
- An analysis of performance factors on Esper-based stream big data processing in a virtualized environment vol.27, pp.6, 2014, https://doi.org/10.1002/dac.2734
- A Study of Smart Power Control Algorithm Using RF Communication in Smart Home Environment vol.9, pp.12, 2013, https://doi.org/10.1155/2013/690902
- Escrowable identity-based authenticated key agreement protocol with strong security vol.65, pp.9, 2013, https://doi.org/10.1016/j.camwa.2012.01.041