1 |
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, “Design and Implementation of PUF-Based “Unclonable” RFID ICs for Anti-Counterfeiting and Security Applications,” Proceedings of the IEEE International Conference on RFID, pp. 58-64, 2008.
|
2 |
P. Tuyls and L. Batina, “RFID-Tags for Anti-Counterfeiting,” Topics in Cryptology - CT-RSA 2006, Lecture Notes in Computer Science, Vol. 3860, pp. 115-131, 2006.
DOI
|
3 |
E.O. Blass, K. Elkhiyaoui, and R. Molva, “Tracker: Security and Privacy for RFIDbased Supply Chains,” Procceding of 18th Annual Network and Distributed System Security Symposium, pp. 455-472, 2011.
|
4 |
K. Elkhiyaoui, E.O. Blass, and R. Molva, “CHECKER: On-site Checking in RFID-based Supply Chains,” Proceedings of the fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 173-184, 2012.
|
5 |
C.L. Chen, Y.Y. Chen, Y.C. Huang, C.S. Liu, C.I. Lin, and T.F. Shih, “Anti-counterfeiting Ownership Transfer Protocol for Low Cost RFID System,” The World Scientific and Engineering Academy and Society Transactions on Computers, Vol. 7, Issue 8, pp. 1149-1158, 2008.
|
6 |
L. Kulseng, Z. Yu, Y. Wei, and Y. Guan, "Lightweight Mutual Authentication and Ownership Transfer for RFID Systems," IEEE INFOCOM, pp. 251-255, 2010.
|
7 |
K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, "An Effcient and Secure RFID Security Method with Ownership Transfer," Proceeding of International Conference on Computational Intelligence and Security, pp. 1090-1095, 2006.
|
8 |
S. Fouladgar and H. Afifi, "An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags," Proceeding of The First International EURASIP Workshop on RFID Technology, pp. 59-62, 2007.
|
9 |
S. Song, "RFID Tag Ownership Transfer," Workshop on RFID Security, 2008.
|
10 |
J. Satio, K. Imamoto, and K. Sakurai, "Reassignment Scheme of an RFID Tag's Key for Owner Transfer," Lecture Notes in Computer Science, Vol. 3823, pp. 1303-1312, 2005.
DOI
|
11 |
J.D. Lee, “RFID Tag Ownership Transfer Protocol using Lightweight Computing Operators,” Journal of Korea Multimedia Society, Vol. 16, No. 12, pp. 1413-1426, 2013.
DOI
|
12 |
G. Kapoor and S. Piramuthu, "Single RFID Tag Ownership Transfer Protocols," IEEE Transactions on Systems, Man, and Cybernetics, Vol. 42, No. 2, pp. 164-173, 2012.
DOI
|
13 |
OECD, The Economic Impact of Counterfeiting and Privacy, Organisation for Economic Co-operation and Development, 2008.
|
14 |
S.H. Choi and C.H. Poon, “An RFID-based Anti-counterfeiting System,” IAENG International Journal of Computer Science, Vol. 35, No. 1, pp. 1-12, 2008.
|
15 |
M. Cerlinca, C. Turcu, T. Cerlinca, R. Prodan, and V. Popa, “Anti-counterfeiting ISO 15693 RFID Solutions Involving Authentication and Traceability using Symmetric and Asymmetric Cryptography,” Proceedings of the 11th International Conference on Development and Application Systems, pp. 175-178, 2012.
|
16 |
H.H. Cheung and S.H. Choi, “Implementation Issues in RFID-based Anti-counterfeiting Systems,” Computers in Industry, Vol. 62, No. 7, pp. 708-718, 2011.
DOI
|
17 |
C.L. Chen, Y.Y. Chen, T.F. Shih, and T.M. Kuo, “An RFID Authentication and Anticounterfeiting Transaction Protocol,” Proceedings of International Symposium on Computer, Consumer and Control, pp. 419-422, 2012.
|
18 |
M.P. Schapranow, A. Zeier, F. Leupold, and T. Schubotz, “Securing EPCglobal Object Name Service-Privacy Enhancements for Anti-counterfeiting,” Proceedings of Second Intelligent Systems, Modelling and Simulation, pp. 332-337, 2011.
|
19 |
A. Arbit, Y. Oren, and A. Wool, “Toward Practical Public key Anti-Counterfeiting for Low-Cost EPC Tags,” Proceeding of International IEEE Conference on RFID, pp. 184-191, 2011.
|
20 |
M.Q. Saeed, Z. Bilal, and C.D. Walter, “An NFC Based Consumer-level Counterfeit Detection FrameWork,” Proceeding of 11th Annual Conference on Privacy, Security and Trust, pp. 135-142, 2013.
|