|
[1].T. Haver, “Security and privacy in RFID applications”, Masters thesis, Norewe-gian University of Science and Technology, Trondheim, Norway, June 2006. [2].A. Juels. “RFID security and privacy: A research survey”, IEEE Journal on Se-lected Areas in Communications, volume 24, Issue 2, pages 381–394, February 2006. [3].K. Koscher, A. Juels, V. Brajkovic, and T. Kohno, “EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond”, In Proceedings of the 16th ACM conference on Computer and communications security, Lightweight Mutual Authentication, Owner Transfer, and Secure Search Protocols for RFID Systems, pages 33–42. 2009. [4].EPCGlobal, “Guidelines on EPC for Consumer Products”, http://www.epcglobalinc.org/public/ppsc_guide/. [5].S. A. Weis, S. E. Sarma, R. L. Rivest and D. W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, In First Interna-tional Conference on Security in Pervasive Computing, 2003. http://theory.lcs.mit.edu/sweis/spc-rfid.pdf/. [6].A. Juels, R. Pappu, “Squealing euros: Privacy protection in RFID-enabled bank-notes”, In Proceedings of Financial Cryptography –FC’03, 2003. [7].M. Rieback, B. Crispo, and A. Tanenbaum, “Uniting legislation with RFID pri-vacy-enhancing technologies”, In Security and Protection of Information, Brno, Czech Republic, 2005. [8].P. Golle, M. Jakobsson, A. Juels, and P. Syverson, “Universal Re-encryption for Mixnets”, The Cryptographers’ Track at the RSA Conference, 2004. [9].A. Juels, “Privacy and Authentication in Low-Cost RFID Tags”, submission 2003. [10].M. Ohkubo, K. Suzuki, and S. Kinoshita, “Cryptographic approach to “priva-cy-friendly” tags”, In RFID Privacy Workshop, MIT, USA, 2003. [11].T. Dimitriou, “A lightweight RFID protocol to protect against traceability and cloning attacks”, In Secure Comm 2005. IEEE Computer Society Press, 2005. [12].S. Canard and I. Coisel, “Data Synchronization in Privacy-Preserving RFID Au-thentication Schemes”, In Conference on RFID Security, 2008. [13].T. Dimitrou, “RFIDDOT: RFID delegation and ownership transfer made simple”, In Proceedings of International Conference on Security and privacy in Commu-nication Networks, Istanbul, Turkey, 2008. [14].K. Osaka, T. Takagi, K. Yamazaki and O. Takahashi, “An efficient and secure RFID security method with ownership transfer”, In Y. Wang, Y. Cheung, and H. Liu, editors, Computational Intelligence and Security — CIS 2006, volume 4456 of Lecture Notes in Computer Science, pages 778–787. Springer, Berlin, Sep-tember 2006. [15].B. Song, “RFID Tag Ownership Transfer” , In RFIDSec08, 2008. [16].L. Kulseng, “Lightweight Mutual Authentication, Owner Transfer, and Secure Search Protocols for RFID Systems”, Master of Science Thesis, Electrical & Computer Engineering, Iowa State University, 2009. [17].P. Jäppinen and H. Hämäläinen, “Enhanced RFID Security Method with Own-ership Transfer”, In Proceedings of the International Conference on Computa-tional Intelligence and Security, pages 382–385. 2008. [18].G. Kapoor and S. Piramuthu, “Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols”, In First International Conference on Networks & Communications, 2009. [19].H. B. Chen, W. B. Lee, Y. H. Zhao and Y. L. Chen, “Enhancement of the RFID Security Method with Ownership Transfer”, In Proceedings of the ICUIMC, pages 251–254. 2009. [20].E. J. Yoon, K. Y. Yoo, “Two Security Problems of RFID Security Method with Ownership Transfer”, In Proceedings of the IFIP International Conference on Network and Parallel Computing, pages 68–73. 2008.
|