1 |
Sarma, S. et al., "RFID Systems and Security and Privacy Implications, Workshop on Cryptographic Hardware and Embedded Systems," pages 454-470, Lecture Notes in Computer Society, pp. 149–153. Computer Science, 2002
|
2 |
Weis, S. et al., "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," First Intern. Conference on Security in Pervasive Computing (SPC), 2003
|
3 |
Kabatianski, Smeets, Johansson, "On the cardinality of systematic authentification codes via error correcting codes." In IEEE Trans on Info TheoryIT42, pp. 566-578, 1996.
|
4 |
Moshe Schwartz and Tuvi Etzion, "The Structure of Single-Track Gray Codes," IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, Nov. 1999.
|
5 |
Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," 1st International Conference on Security in Pervasive
|
6 |
남용택, 장종수, 손승원, "유비쿼터스 환경에서의 개인정보보호기술," 전자통신동향분석, 제 20권 제1호 2005년 2월
과학기술학회마을
|
7 |
오기욱, "그레이코드를 이용한 RFID 보안 프로토콜과 시스템 설계," 숭실대학교 박사학위논문, 2007년
|
8 |
B. J. Feder, "Delta to Invest in radio Tags for Luggage at Airports," The New York Times, July 1, 2004. packages, CNET, 2003
|
9 |
Blum, A., Kalai, A., and Wasserman, H. "Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model." Journal of the ACM 50, 4, pp 506-519, July 2003.
DOI
ScienceOn
|
10 |
Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., and Szydlo, M., "Security Analysis of a Cryptographically-Enabled RFID Device." In USENIX Security (2005).
|
11 |
Yagni_Home, http://yagni.com/graycode/index.html
|
12 |
강전일, 박주성, 양대헌, "RFID 시스템에서 프러이버시 보호기술," 정보보호학회지, 제 14권 제 6호, 2004년 12월.
|