1 |
Ari Juels, 'RFID Security and Privacy: A Research Survey,' IEEE Journal on Selected Areas in Communications, Vol.24, No.2, February 2006
|
2 |
최원준, 노병희, 유승화, '랜덤화된 트리워킹 알고리즘에서의 RFID 태그 보안을 위한 백워드 채널 보호 방식,' 한국통신학회논문지, Vol.30, No.5C, 2005
|
3 |
D.Henrici, P.Muller, 'Hash-based Enhancement of Location Privacy for Radio-frequency Identification Devices Using Varying Identifiers,' Workshop on Pervasive Computing and Communications Security, 2004
|
4 |
Juels Ari et al, 'The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy', 2003
|
5 |
Gildas Avoine, Philppe Oechslin, 'RFID Traceability: A Multilayer Problem,' The 9th International Conference on Financial Cryptography, LNCS Vol. 3570, pp.125-140, 2005
|
6 |
Eunjin Kim, Sun Ho Kim, Byeong-hee Roh, 'Security and Privacy Issues to Deploy RFID-based Services,' KINGPC'2005, Seoul, Korea, 2005. 11
|
7 |
S.E.Sarma, S.A.Weis, D.W.Engels, 'RFID systems, security and privacy implications', Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT, 2002
|
8 |
Yong Hwan Lee, Hee Jung Kim, Byeong-hee Roh, and S.W. Yoo, 'Tree-Based Classification Algorithm for Heterogeneous Unique Item ID Schemes,' EUC Workshops 2005, LNCS Vol.3823, pp.1078-1087, Dec. 2005
|