1 |
A. Juels,'RFID Security and Privacy: A reserch Survey,' IEEE Journal on Selected Areas in Communications, VOL. 24, NO. 2, Feb. 2006
|
2 |
S. Weis, S. Sarma, R. Rivest and D. Engels, 'Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,' in Proc. the First International Conference on Security in Pervasive Computing, 2003
|
3 |
D. N. Duc, J. Park, H. Lee, K. Kim, 'Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning,' in Proc. the Symposium on Cryptography and Information Security, 2006
|
4 |
L. Lu, J. Han, L. Hu, Y. Liu, and L. M. Ni, 'Dynamic Key-Updating: Privacy- Pres erving Authentication for RFID Systems,' in Proc. Pervasive Computing and Communication, 2007
|
5 |
EPCglobal Inc., 'Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.09,' 2005
|
6 |
D. Hentici and P. Muller, 'Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers,' in Proc. the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004
|
7 |
T. Dimitriou, 'A Lightweight RFID Protocol to protect against Traceability and Cloning attacks,' in Proc. the First International Conference on Security and Privacy for Emerging Areas in Communiations Networks, 2006
|
8 |
RFID Journal, http://www.rfidjournal.com/
|
9 |
L. Gong, R. Needham, and R. Yahalom, 'Reasoning about Belief in Cryptographic Protocols,' in Proc. the IEEE Symposium on Research in Security and Privacy, 1990
|
10 |
C. Qingling, Z. Yiju, and W. Yonghua, 'A minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis,' in Proc. International Colloquium on Computing, Communication, Control, and Management, 2008
|