1 |
"Radio Frequency Identification: Applications and Implications for Consumers," Workshop Report from the Staff of the Federal Trade Commission, Federal Trade Commission, Mar. 2005.
|
2 |
정보통신단체표준(잠정표준) TTAI.KO-12.0091, "수동형 RFID 보안태그와 리더의 인증 및 데이터 보호프로토콜," 2008년 12월.
|
3 |
최용제, 최두호, 이상연, 정교일, "수동형 RFID를 위한 보안 기술 구현," 한국통신학회 하계종합학술 발표회, pp. 96-99, 2008년 7월.
|
4 |
S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, 2004.
|
5 |
ISO/IEC 18000-6 Amd1, "Information technology -Radio frequency identification for item management - Part 6:Parameters for air interface communications at 860 MHz to 960 MHz, AMENDMENT 1: Extension with Type C and update of Types A and B," 2004.
|
6 |
S.M. Lee, Y.J. Hwang, D.H. Lee, and J.I. Lim, "Efficient Authentication for Low-Cost RFID Systems," International Conference on Computational Science and its Applications 2005, LNCS 3480, pp. 619-627, 2005.
|
7 |
K.W. Rhee, J. Kwak, S.J. Kim, and D.H. Won, "Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment," International Conference on Security in Pervasive Computing 2005, LNCS 3450, pp. 70-84, 2005.
|
8 |
M. Weiser, "Some Computer Science Issues in Ubiquitous Computing," Communications of the ACM, vol. 36, no. 7, pp. 74-84, July 1993.
|
9 |
N. Borselius, "Mobile Agent Security," Electronics and Communication Engineering Journal, vol. 14, no. 5, pp. 211-218, Oct. 2002.
|
10 |
A. Juels, "RFID Security and Privacy: A Research Survey," IEEE Journal of Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, Feb. 2006.
DOI
|