References
- D. M. Ewatt and M. Hayes. 'Gillette razors get new edge: RFID tags'. Information Week, 13 January 2003. http://www.informationweek.com
- S. E. Sarma. 'Towards the five-cent tag'. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. http://www.autoidcenter.org
- S. E. Sarma, S. A. Weis, and D. W. Engels. 'Radio-frequency identification security risks and challenges'. CryptoBytes, 6(1), 2003
- 'Security technology: Where's the smart money?' The Economist, pp. 69-70. 9 February 2002
- S. E. Sarma, S. A.Weis, and D. W. Engels. 'RFID systems, security and privacy implications'. Technical Report MIT-AUTOID-WH-014, Auto ID Center, MIT, 2002
- S. E. Sarma, S. A. Weis, and D. W. Engels. 'Radio-frequency identification systems'. Workshop on Cryptographic Hardware and Embedded Systems, CHES02, LNCS 2523, pp. 454-469, Springer-Verlag, 2002
- A. Juels, R. L. Rivest and M. Szydlo. 'The Blocker Tag : Selective Blocking of RFID Tags for Consumer Privacy'. In Proceedings of 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 103-111, 2003
- S. A. Weis. 'Radio-frequency identification security and privacy'. Master's thesis, . May 2003
- S. A.Weis, S. Sarma, R. Rivest, and D. Engels. 'Security and privacy aspects of low-cost radio frequency identification systems'. In First International Conference on Security in Pervasive Computing 2003, LNCS 2802, pp. 201-212, Springer-Verlag, 2004
- A. Juels and R. Pappu. 'Squealing Euros: Privacy protection in RFID-enabled banknotes'. Financial Cryptography 03, LNCS 2742, pp. 103-121, Springer-Verlag, 2003
- M. Ohkubo, K. Suzuki, and S. Kinoshita. 'A Cryptographic Approach to 'Privacy-Friendly' tag'. RFID Privacy Workshop, Nov 2003. http://www.rfid.edu.com/
- D. Engels. 'The Reader Collision Problem'. Technical Report. MIT-AUTOID-WH-007, MIT Auto ID Center, 2001. http://www.autoidcenter.org
- K. Finkenzeller. RFID Handbook, John Wiley and Sons. 1999
- T. Scharfeld. 'An Analysis of the Fundamental Constraints on Low Cost Passive Radio-Frequency identification System Design'. MS Thesis, Department of Mechanical Engineering, Massachusetts Institute of Technology, Cambridge, MA 02139, 2001
- MIT Auto-ID Center, http://www.autoidcenter.org
- D. L. Brock. 'The electronic product code (EPC): A naming scheme for objects'. Technical Report MIT-AUTOID-WH-002, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org
- D. L. Brock. 'EPC Tag Data Specification'. Technical Report MIT-AUTOID-WH-025, MIT Auto ID Center, 2003. http://www.autoidcenter.org
- D. Engels. 'EPC-256: The 256-bit Electronic Product Code Representation'. Technical Report MIT- AUTOID-WH-010, MIT Auto ID Center, 2003. Available from http://www.autoidcenter.org
- 'mCloak : Personal/corporate management of wireless devices and technology', 2003. Abailable form http://www.mobilecloak.com
- C. Cachin. 'On-Line Secret Sharing'. Cryptography and Coding: The 5th IMA Conf., LNCS 1025, pp. 190-198, Springer-Verlag, 1995
- L. Chen, D. Gollmann, C. J. Mitchell and P. Wild. 'Secret sharing with Reusable Polynomial'. Australasian Conference on Information Security and Privacy, ACISP 97, LNCS 1270, pp. 183-193, Springer-Verlag, 1997
- P. Fedlman. 'A Practical scheme for Noninteractive Verifiable secret sharing'. Proceeding of the 28th Annual Symposium on the Foundation of Computer Science, pp. 427-437, 1987
- S. J. Kim, S. J. Park and D. H. Won. 'Proxy Signatures, Revisited'. Proceedings of ICICS '97, International Conference on Information and Com- munications Security, LNCS 1334, pp. 223-232, Springer-Verlag, 1997
- T. P. Pedersen. 'A Threshold cryptosystem without a trusted party'. Proceedings of Eurocrypt '91, LNCS 547, Springer-verlag, 1991, pp. 522-526
- A. Shamir, 'How to share a secret'. Communication of the ACM, vol. 21, pp. 120-126, 1979 https://doi.org/10.1145/359340.359342
- M. Tompa and H. Woll. 'How to share a secret with cheater'. Journal of Cryptology, vol. 1, pp. 133-138, 1988 https://doi.org/10.1007/BF02252871