1 |
K. Finkenzeller, RFID Handbook, John Wiley& Sons, 2002
|
2 |
A. Juels, 'Yoking Proof' for RFID Tags', IEEE Computer Society, Proceedings of the First International Workshop on Pervasive Computing and Communication Security - PerSec 2004, pp.138-143, 2004
|
3 |
J. Saito and K. Sakurai, 'Grouping Proof for RFID Tags', IEEE Computer Society, Proceeding of the 19th International Conference on Advanced Information Networking and Applications(AINA'05), vol 2, pp. 621-624, 2005
|
4 |
A. Lenstra and E. Verheul, 'Selecting Cryptographic Key Sizes', Journal of Cryptography, vol 14, number 4, pp.255-293, 2001
|
5 |
G. Avoine and P. Oechslin, 'RFID Traceability: A Multilayer Problem', Springer- Verlag, Financial Cryptography - 0FC'05, LNCS, vol 3570, pp.125-140, 2005
|
6 |
Selwyn and Priamuhtu, 'On Existence Proofs for Multiple RFID tags', IEEE Computer Society, IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2006, pp.317-320, 2006
|
7 |
S. Weis, S. Sarma, R. Rivest, and D. Engels, 'Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems', Springer-Verlag, International Conference on Security in Pervasive Computing - SPC 2003, LNCS, Vol 2802, pp. 454-469, 2004
|
8 |
Zhaoyn Liu and Dichao Peng, 'True random number generator in RFID systems against traceability', IEEE Computer Society, Consumer Communication and Networking Conference, vol 1, pp.620-624, January 2006
|
9 |
T. Dimitriou, 'A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks', IEEE Computer Society, Proceeding of IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm, pp.59-66, 2005
|