1 |
김주해, 최은영, 이동훈, "복제 공격 저항성을 갖는 전자봉인 보안 모델", 정보보호학회논문지 제 17권 제5호, pp.111-116, Oct, 2007
과학기술학회마을
|
2 |
D.Henrici and Paul Muller, "Hash-based enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers", PerSec'04 at IEEE PerCom, pp.149-153, 2004
|
3 |
Conveyance Security Device (CSD)-to-CSD Reader Interface Control Document (ICD) Baseline version 1.0, December 10, 2007
|
4 |
CSD Reader-to-Data Consolidation Point (DCP) Interface Control Document (ICD) Baseline version 1.0, December 10, 2007
|
5 |
Conveyance Security Device (CSD) Requirement Document Baseline version 1.2, December 10, 2007
|
6 |
이향진, 신동휘, 전길수, "RFID 프라이버시 보호 기술 및 표준화 동향", 정보보호학회지 제 18권 제4호, 2008.8
과학기술학회마을
|
7 |
Mikko Lehtonen, Florian Michahelles, and Elgar Fleisch, "How to Detect Cloned Tags in a Reliable Way from Incomplete RFID Traces", 2009 IEEE International Conference on RFID, pp.257-264, April 27-28, 2009
|
8 |
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, and Florian Michahelles, "Securing RFID Systems by Detecting Tag Cloning", Lecture Notes in Computer Science, vol. 5538, pp.291-308, Springer, 2009
|
9 |
Davide Zanetti, Leo Fellmann, and Srdjan, "Privacypreserving Clone Detection for RFID-enabled Supply Chains", 2010 IEEE International Conference on RFID, pp.37-44, April 14-16, 2010
|