|
[1] Stephen. A. Weis, “Radio-Frequency Identification Security and Privacy,” Master thesis, M.I.T. June 2003. [2] Stephen. A.Weis, S. Sarma, R. Rivest, and D. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Proc. First International Conference on Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, Springer-Verlag. [3] D. Molnar and D. Wagner, “Privacy and Security in Library RFID Issues, Practices, and Architectures,” Proc. ACM Computer and communications Security ’04, Washington DC, USA, October 25 - 29, 2004. [4] A. Juels and R. Pappu, “Squealing Euros: Privacy Protection in RFID-Enabled Banknotes,” Financial Cryptography ’03, R. Wright, Ed., Springer-Verlag, 2003. [5] P. Golle, M. Jakobsson, A. Juels, and P. Syverson, “Universal Re-encryption for Mixnets,” RSA Conf. Cryptographers’ Track ’04, LNCS 2964, 2004, pp. 163–78, Springer-Verlag. [6] A. Juels, R. L. Rivest, and M. Szydlo, “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy,” Proc. ACM Computer and communications Security ’03, 2003, pp. 103-11. [7] EPC global Inc. Sept. 17, 2007, http://www.epcglobalinc.org/home [8] A. Cavoukian, “Tag, You’re It: Privacy Implications of Radio Frequency Identification (RFID) Technology,” Info. and Privacy Commissioner, Ontario, Toronto, Feb. 2004. http://www.ipc.on.ca/scripts/index_.asp?action=31&P_ID=15007 [9] “RFID White Paper,” Sept. 2007, http://www.rfidjournal.com/whitepapers/ [10] M. Ohkubo, K. Suzuki, and S. Kinoshita, “Cryptographic Approach to Privacy-Friendly tags,” Proc. RFID Privacy Workshop, MIT, USA, (2003). [11] Ted Phillips, Tom Karygiannis, and Rick Kuhn, “Security Standards for the RFID Market,” IEEE Security and Privacy, Vol. 3, No. 6, pp. 85-89, Nov.-Dec. 2005. [12] Yang Xiao, Xuemin Shen, Bo Sun, and Lin Cai, “Security and Privacy in RFID and Applications in Telemedicine,” Communications Magazine, IEEE, Vol. 44, pp. 64-72, April 2006. [13] Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda, “RFID Systems: A Survey on Security Threats and Proposed Solutions,” Dec. 2007, http://lasecwww.epfl.ch/~gavoine/download/papers/PerisHER-2006-pwc.pdf [14] Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum, “The EVolution of RFID Security,” IEEE Pervasive Computing, Vol. 5, No. 1, 62-69, January-March 2006. [15] Simson L. Garfinkel, Aril Juels and Ravi Pappu. “RFID Privacy: An Overview of Problems and Proposed Solutions,” IEEE Security and Privacy, Vol. 3, Issue 3, pp. 34-43, May 2005. [16] A. Juels, D. Molnar, and D. Wagner, “Security and privacy issues in e-passports,” Proc. Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm, Athens, Greece, pp. 74-88, Sept. 2005. [17] “Philips and the 2006 FIFA World Cup,” June 2006, http://www.ameinfo.com/88301.html [18] Tucker Balch, Adam Feldman, and Wesley Wilson, “Assessment of an RFID System for Animal Tracking,” http://www.smartech.gatech.edu/dspace/bitstream/1853/6495/1/GIT-CC-04-10.pdf [19] Sanjay E. Sarma, Stephen A. Weis, Daniel W. Engels, “RFID systems and security and privacy implications,” in: Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2002, LNCS no. 2523, 2003, 454–469. [20] NTRU. GenuID. http://www.ntru.com/products/genuid.htm. [21] Kirk H.M. Wong, Patrick C.L. Hui, Allan C.K. Chan, “Cryptography and authentication on RFID passive tags for apparel products,” Computers in Industry, Vol. 57, Issue 4, pp.342-349, May 2006. [22] EPCTM Generation 1 Tag Data Standards, Version 1.1 rev 1.27, EPC Global Inc., May 2005, http://www.epcglobalinc.org/standards_ technology/specifications.html. [23] “RFID tracks future everyday apps,” May 2005, http://www.eetasia.com/ARTICLES/2005MAY/B/2005MAY16_STECH_RFD_TA.pdf?SOURCES=DOWNLOAD
|