1 |
D. Lin, H. G. Elmongui, E. Bertino, and B. C. Ooi, "Data management in RFID applications", International conference on database and expert system application, LNCS 4653, 2007.
|
2 |
Miyako Ohkubo. Koutatou Suzuki and Shingo Kinoshita, "Cryptographic Approach to Privacy-Friendly Tags.", Submitted 2003.
|
3 |
Klaus Finkenzeller, "RFID HANDBOOKFundamentals and Applications in Contactless Smart Cards and Identification", Second Edition, translated by Rachel Waddington, 2002.
|
4 |
H.Y. Chien, "Secure Access Control Schemes for RFID System with Anonymity", In Proceedings of 1005 national Workshop on Future Mobile and Ubiquitous Information Technologies. 2006.
|
5 |
D. Henrici and P. Müuller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers," Proceeding of the Second IEEE Annual Conference on Pervasive Computing and Communication Security, pp. 149-153, Mar. 2004.
|
6 |
CRYPTOREC reports, published 2002 in Japen.
|
7 |
M. Ohcubo, K. Suzuki, and S kinoshita, "Hash-Chain Based Forward-Secure Privacy Protection Seheme for Low-Cost RFID", Proceeding of the SCIS 2004, pp.719-724, 2004.
|
8 |
J. Daemen, V. Rijmen, " The Design of Rijndeal," AES-The advanced Encryption Standard, Springer-Verlog, Berlin, Heidelberg, New York, 2002.
|
9 |
구본석, 유권호, 양상훈, 장태주, 이상진, "RFID 태그를 위한 초소형 AES 연산기의 구현", 정보보호학회논문지, 제16권, 제5호, pp.67-77, 2006. 10.
과학기술학회마을
|
10 |
J. Yang, J. Park, and K. Kim "Security and Privacy on Authentication Protocol for Low-Cost Radio", In The 2005 Symposium on Cryptography and Information Security. 2005.
|