|
[1]“An Evaluation of Security Threats and Countermeasures in Distributed RFID” Infrastructuresinfo.iicm.edu/thesis/sstadlober.pdf, pp.1-113. [2]A. Juels “RFID security and privacy: a research survey”, IEEE Journal, Volume 24, Issue 2, Feb. 2006, pp.381 – 394 [3]C, Chatmon, T. V. Le , M. Burmester , “Secure Anonymous RFID Authentication Protocols” http://whitepapers.techrepublic.com pp. 1-10 [4]D. R. Thompson, N. Chaudhry, C. W. Thompson, “RFID SECURITY THREAT MODEL” http://www.csce.uark.edu. [5]D. C. Ranasinghe , K. S. Leong , M. L. Ng, D. W. Engels, P. H. Cole, ” A Distributed Architecture for a Ubiquitous RFID Sensing Network,” Proceedings of the 2005 International Conference, pp.7- 12, Dec. 2005. [6]F. Christian , L. Matthias , R. Christof “ Facilitating RFID Development with the Accada Prototyping Platform,” Fifth Annual IEEE International Conference, pp.495-500, Mar. 2007. [7] EPCglobal Web site. www.epcglobalinc.org, 2005. [8] EPCglobal Object Name Service (ONS) 1.0. Technical report, EPCGlobal Inc,April 2004. [9] F. Thornton, B. Haines, A. M. Das , H. Bhargava, A. Campbell , J. Kleinschmidt , ”RFID Security,” pp. 1-266. [10] H. Maurer, D. Helic, ” An Evaluation of Security Threats and Countermeasures in Distributed RFID Infrastructures,” pp. 1-113 [11]H. Gilbert , M. Robshaw , H. Sibert. “an active Attack Against HB+ -A Provably Secure Lightweight Authentication Protocol,”eprint.iacr.org/2005/237.pdf [12]H. Kim , J.H. Oh, J.Y. Choi, “Security Analysis of RFID Authentication for Pervasive Systems using Model Checking,” 30th Annual International Computer Software and Applications Conference (COMPSAC'06), 2006 compsac, pp.195-202. [13]H.S. Kim, J.H. Oh, J.Y. Choi, “Analysis of the RFID Security Protocol for Secure Smart Home Net,” Hybrid Information Technology International Conference, Vol 2. pp.356 – 363, Nov. 2006 [14]L.Bolotnyy , G. Robins, ” Physically Unclonable Function-Based Security and Privacy in RFID Systems,” Fifth Annual IEEE International Conference, pp.211 – 220, Mar. 2007. [15]J. F. Cui, H. S. Chae, “Agent-Based Design of Load Balancing System for RFID Middlewares”, Future Trends of Distributed Computing Systems, 200711th IEEE International Workshop, pp.21 – 30, Mar. 2007. [16] J. Song, H. Kim, “The RFID middleware system supporting ontext-aware access control service,” Advanced Communication Technology, 2006, The 8th International Conference Volume 1, pp. 863-866, Feb. 2006. [17] J. Song, T. Kim, S. Lee, and H. Kim,” Security Enhanced RFID Middleware System,” Transactions On Engineering, Computing And Technology V10, pp.79-82, Dec. 2005. [18] K. S. Leong , M. L. Ng , D.W. Engels ,” EPC Network Architecture,” pp. 1-5 [19] K. An, M. Chung, “ALE Application Framework for Constructing Effective RFID Application,” Korean Ministry of Education & Human Resources Development. pp. 226 - 233 [20] D. S . Kim , T. H. Shin , J. S. Park, “A Security Framework in RFID Multi-domain System,” Availability, Reliability and Security, 2007 The Second International Conference pp.1227 – 1234, April. 2007 [21]M. Schwan ,” An extended model of security policy for multi-applicative smart cards”, Conference on Computer and Communications Security, pp.1-6
[22]N. Park , J. Lee, H. Kim, K. Chung , S. Sohn , “A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM : Secure Mobile RFID Middleware System)”, Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP, pp.1-4 [23]K. Osaka , T. Takagi, K. Yamazaki, O. Takahashi, ” An Efficient and Secure RFID Security Method with Ownership Transfer,” Computational Intelligence and Security, 2006 International Conference, Volume 2, pp.1090 – 1095, Nov. 2006 [24] Klaus Finkenzeller, ”RFID Handbook” pp.1-434. [25]T .Chan , W. Cheung, J.S. Li , V. Ng, W. Cheung, E. Wong, Z. Luo, “Experimental Analysis of an RFID Security Protocol, “ IEEE International Conference, pp.62 – 70 ,Oct. 2006 [26]T.Phillips, T.Karygiannis, R.Kuhn, “Security standards for the RFID market,” Security & Privacy Magazine, IEEE ,Volume 3, Issue 6, pp.85 – 89, Nov.-Dec. 2005. [27]M.R.Rieback, B. Crispo, A.S. Tanenbaum,” The evolution of RFID security, “ Pervasive Computing, IEEE Volume 5, Issue 1, pp.62 – 69, Jan.-March 2006 [28]”Securing RFID Data for the Supply Chain” http://www.verisign.com/epc [29]S. Lee, T. Asano , K. Kim, ”RFID Mutual Authentication Scheme based on Synchronized Secret Information,” Symposium on Cryptography and Information Security, pp 1-6, Jan. 2006. [30]The Application Level Events (ALE) Specification, Version 1.0,EPCGlobal Inc, September 2004. [31]X. Qinghan, B.Cam, G. Thomas,” RFID Security Issues in Military Supply Chains,” Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference , pp.599 – 605, Apr. 2007. [32]Y. Gil; D. Ahn; S. Pan; Y. Chung, “Access control system with high level security using fingerprints,” Applied Imagery Pattern Recognition Workshop, 2003.Proceedings. Volume 32nd, pp. 238 – 243, Oct. 2003.
|