|
[1]Jihoon Myung and Wonjun Lee, “An Adaptive Memoryless Tag Anti-Collision Protocol for RFID Networks.”, the 24th IEEE Annual Conference on Computer Communications (INFOCOM 2005), Poster Session, Miami, USA, March 2005. [2]Shang-Wei Wang, Wun-Hwa Chen, Chrng-Shyong Ong, Li Liu, and Yun-Wen Chuang, “RFID applications in hospitals : a case study on a demonstration RFID project in a Taiwan hospital.”, Proceedings of the 38th Hawaii International Conference on System Sciences 2005. [3]Katina Michael, and Luke McCathie, “The pros and Cons of RFID in Supply Chain Management.”, Mobile Business International Conference, 2005. [4]Su-Ryun Lee, Sung-Don Joo, and Chae-Woo Lee, “An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification.”, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services pp. 166-174, 2005. [5]Ching Law, Kayi Lee, and Kai-Yeung Siu, “Efficient Memoryless Protocol for Tag Identification.”, In Proceedings of the International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 75-84, Boston, MA, August 2000. [6]Ho-seung Choi, Jae-Ryong Cha, and Jae-Hyun Kim, “Fast Wireless Anti-collision Algorithm in Ubiquitous ID System.”, Vehicular Technology Conference Page(s):4589 - 4592 Vol. 6, 2004. [7]István Vajda and Levente Buttyán, “Lightweight Authentication Protocols for Low-Cost RFID Tags”, Workshop on Security in Ubiquitous Computing, October 2003. [8]L. Lamport, “Password Authentication with Insecure Communication”, Communications of ACM, Vol. 24, pp. 770-772, 1981. [9]Y. C. Chen and L. Y. Yeh, “An Efficient Nonce-Based Authentication Scheme with Key Agreement”, Applied Mathematics and Computation, Available online 12 January 2005. [10]M. Ohkubo, K. Suzuki, and S. Kinoshita, “Cryptographic Approach to “Privacy-Friendly” Tags.”, In RFID Privacy Workshop, MIT, USA, 2003. [11]Chi Sung Laih, Lein Harn, and Chin Chen Chang, “Contemporary Cryptography and It’s Applications.” 旗標出版有限公司. [12]H. Vogt., “Multiple Object Identification with Passive RFID Tags.”, Proc. Pervasive 2002.. IEEE International Conference on Systems, Man and Cybernetics, pp. 98-113. October 2002. [13]A. Micic, A. Nayak, D. Simplot-Ryl, I. Stojmenović. ”A hybrid randomized protocol for RFID tag identification.”, in: Sensor Review, to appear, 2006. [14]Jihoon Myung, Wonjun Lee, Jaideep Srivastava, “Adaptive Binary Splitting: A RFID Tag Collision Arbitration Protocol for Tag Identification.”, accepted for publication in ACM Mobile Networks and Applications (ACM MONET), 2006. [15]Ho-Seung Choi, Jae-Ryon Cha, Jae-Hyun Kim, ” Fast Wireless Anti-collision Algorithm in Ubiquitous ID System.” , page(s): 4589- 4592 Vol. 6, Vehicular Technology Conference, 2004. [16]J. I. Capetanakis, “Tree algorithms for packet broadcast channels”, IEEE Trans. Inform. Theory, vol. 25, no. 4, pp. 505--515, Sept. 1979. [17]Chandon, Pierre, Wansink Brian, and Laurent Gilles. “A Benefit Congruency Framework of Sales Promotion Effectiveness,” Journal of marketing. Vol. 64 , pp. 65-81 (October), 2000. [18]R. Bucklin and S. Gupta, "Commercial Use of UPC Scanner Data: Industry and Academic Perspectives," Marketing Science, 1999. [19]Jon Hannibal Stokes, “Understanding Moore''s Law”, Http://arstechnica.com/articles/paedia/cpu/moore.ars , 2003. [20]Sarma, S. Brock, D. Engels, D. “Radio frequency identification and the electronic product code.”, IEEE Micro, Volume: 21, Issue: 6, page(s): 50-54, Nov/Dec 2001. [21]Rao, K.V.S., “An overview of backscattered radio frequency identification system (RFID).”, IEEE Asia Pacific Microwave Conference, Volume: 3, page(s): 746-749, 1999. [22]Marrocco, G., “Gain-optimized self-resonant meander line antennas for RFID applications.”, IEEE Antennas and Propagation Letters, Volume: 2, page(s): 302- 305, 2003. [23]Steven Molesa, David R. Redinger, Daniel C. Huang, and Vivek Subramanian. “High-quality inkjet-printed multilevel interconnects and inductive components on plastic for ultra-low-cost RFID applications.”, in Proc. Materials Re-search Society Spring Meet., H8.3.1-6 vol. 769, 2003. [24]Marrocco, G., Fonte, A., Bardati, F., “Evolutionary design of miniaturized meander-line antennas for RFID applications.”, IEEE Trans. Antennas &Propagaion, page(s): 362- 365 vol.2, 2002. [25]Cheng-Ju Li, Li Liu, Shi-Zong Chen, Chi Chen Wu, Chun-Huang Huang, Xin-Mei Chen., “Mobile healthcare service system using RFID.”, IEEE International Conference on Networking, Sensing and Control, page(s): 1014- 1019 Vol.2, 2004. [26]Heather Smith, Benn Konsynski, “Developments in practice X: Radio Frequency Identification (RFID) - An internet for physical objects.”, Communications of the Association for Information Systems (Volume 12) pp.301-311, 2003. [27]Zongwei Luo, Terry Chan, Jenny S. Li, “A Lightweight Mutual Authentication Protocol for RFID Networks.”, IEEE International Conference on e-Business Engineering, 18-20, October 2005. [28]Dimitriou, T., “A lightweight RFID protocol to protect against traceability and cloning attacks.” In Proc. IEEE Intern. Conf. on Security and Privacy in Communication Networks, 2005. [29]Gene Tsudik., “Ya-trap: Yet another trivial RFID authentication protocol.” International Conference on Pervasive Computing and Communications, PerCom, 2006. [30] Alrabady, A.I.; Mahmud, S.M., “Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs.”, Vehicular Technology, IEEE Transactions on Volume 54, Issue 1, Page(s):41 – 50, Jan. 2005
|