|
[1] F. Stajano, “Security for Ubiquitous Computing,” 2002. [2] S. Brands and D. Chaum, “Distance-bounding protocols,” In proceedings of Advances in Cryptology-EUROCRYPT’93, Lecture Notes in Computer Science, Vol.765, Springer-Verlag Berlin Heidel berg, 1994, pp.344-359. [3] S. Capkun, L. Buttyan, and J. Hubaux, “SECTOR:Secure Tracking of Node Encounters in Multi-hop Wireless Networks,” In proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003, pp.21-32. [4] D. Denning and P. MacDoran, “Location-Based Authentication:Grounding Cyberspace for better Security,” In Computer Fraud and Security, Elsevier, 1996, pp.12-16. [5] M. Fujii, “Secure Positioning of Mobile Terminals with Simplex Radio Communication,” http://arxiv.org/PS_cache/cs/pdf/0608/0608031.pdf. [6] S. Knappe, V. Gerginov, P.D.D. Schwindt, V. Shah, H.G. Robinson, L. Hollberg, and J. Kitching, “Atomic vapor cells for chip-scale atomic clocks with improved long-term frequency stability,” Optics Letters, Vol.30, no.18, Sep.2005, pp.2351-2353. [7] H. Lee and J. Kim, “Privacy threats and issues in Mobile RFID,” In proceedings of the First International Conference on Availability, Reliability and Security, 2006, pp.510-514. [8] T.S.E. Ng and H. Zhang, “Predicting Internet Network Distance with Coordinates-Based Approached,” IEEE INFOCOM, Vol.1, 2002, pp.170-179. [9] D. Singelee and B. Preneel, “Location verification using secure distance bounding protocols,” IEEE Mobile Adhoc and Sensor Systems Conference, Nov.2005, pp.834-840. [10] N. Sastry, U. Shankar and D. Wagner, “Secure verification of location claims,” In proceedings of the ACM workshop on Wireless security, Sep.2003, pp.1-10. [11] A. Vora and M. Nesterenko, “Secure location verification using radio broadcast,” In proceedings of OPODIS 2004, Lecture Notes in Computer Science, Vol.3544, Springer-Verlag Berlin Heidelberg, 2005, pp.369. [12] M. Weiser, “The Computer for the Twenty-First Century,” Scientific American, Sep. 1991, pp.94-100. [13] RFID Journal, “Merloni unveils RFID appliance,” http://www.rfidjournal.com/article/articleview/369/1/1, April, 2003. [14] RFID Journal, “Nokia unveils RFID Phone Reader,” http://www.rfidjournal.com/article/articleview/834/1/1, March, 2004. [15] A. Shamir. How to share a secret, Communication ACM, Vol.22, 1979, pp.612-613. [16] S. Sarma, D. Brock, D. Engels, “Radio frequency identification and the electronic product code,” IEEE Micro, Vol.21, Issue 6, Nov./Dec.2001, pp.50-54. [17] K.V.S. Rao, “An overview of backscattered radio frequency identification system(RFID),” IEEE Asia Pacific Microwave Conference, Vol.3, 1999, pp.746-749. [18] G. Marrocco, “Gain-optimized self-resonant meander line antennas for RFID applications,” IEEE Antennas and Propagation Letters, Vol.2, 2003, pp.302-305. [19] S. Molesa, D.R. Redinger, D.C. Huang, and V. Subramanian, “High-quality inkjet-printed multilevel interconnects and inductive components on plastic for ultra-low-cost RFID applications,” In proceedings of Materials Re-search Society Spring Meet, H8.3.1-6, Vol.769, 2003. [20] G. Marrocco, A. Fonte, F. Bardati, “Evolutionary design of miniaturized meander-line antennas for RFID applications,” IEEE Trans. Antennas and Propagation, Vol.2, 2002, pp.362-365. [21] M. Langheinrich, “A Privacy Awareness System for Ubiquitous Computing Environments,” presented at 4th International Conference on Ubiquitous Computing, 2002. [22] L. Kagal, T. Finin, and A. Joshi, “Trust-Based Security in Pervasive Computing Environment,” IEEE Computer, 2001.
|