References
- Di Ma and Gene Tsudik, "Security and Privacy in Emerging Wireless Networks", IEEE Wireless Communication, Oct 2011, pp.12-21
- Lenka Lhotska, "Security Recommendation for Implementation in Distributed Healthcare System", ICCST 2008, pp76-83
- Ming Li, etc, "Data Security and Privacy in Wireless Body Area Networks", IEEE Wireless Communication, 2010, pp.51-58
- Jelena Misic, "Enforcing Patient Privacy in Healthcare WSAs Using ECC Implemented on 802.15.4 Beacon Enabled Clusters", 6th Annual IEEE International Conference on Pervasive Computing and Communications", 2008, pp.686-690
- Jung Tae Kim, "Privacy and Security Model for RFID Healthcare System in Wireless Communication Network", vol.16, no.6, 2012, pp.1223-1128 https://doi.org/10.6109/jkiice.2012.16.6.1223
- Hai Liu, etc, "Taxonomy and Challenges of the Integration of RFID and Wireless Sensor Networks", IEEE Network, 2008, pp.26-32
- Faouzi Kamoun. "RFID System Management: State-of-the Art and Open Research Issues" IEEE Transactions on Network and Service Management, vol.6, no. 3, pp.190-205, Sep. 2009 https://doi.org/10.1109/TNSM.2009.03.090305
- George Poulopoulos, Konstantinos Markantonakis, Keith Mayes, "A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems", pp.706-p.711, 2009 International Conference on Availability, Reliability and Security
- S.A.Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Comp., volume 2802 of LNCS, pages 201-212, 2004.
- H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, 2007, pp.337-340. https://doi.org/10.1109/TDSC.2007.70226
- A. Juels, "RFID Security and Privacy: A research survey", Selected Areas in Communications, IEEE Journal, pp.104-112, 2006
- Faouzi Kamoun, "RFID System Management: State-of-the Art and Open Research Issues", IEEE Transaction on Network and Service Management, vol.6, no.3, Sep, p.190-1205, 2009 https://doi.org/10.1109/TNSM.2009.03.090305
- A. Bongdanov, etal, " Hash Functions and RFID Tags: Mind the Gap," Proc. of the CHES08, vol. 5154 of LNCS, p.283-299, 2008
- M. Feldhofer, etal, "Strong Authentication for RFID Systems Using the AES Algorithm," Proc. of the CHES04, vol.3156, p.85-140, 2004