References
- M. Weiser, "Some Computer Science Issues in Ubiquitous Computing," Communications of the ACM, vol. 36, no. 7, pp. 74-84, July 1993.
- K. Finkenzeller, "RFID Handbook: Fundamentals and applications in Contactless Smart Cards and Identification," Second Edition, John Wiley &Sons Ltd, pp. 195-219, 2003.
- Selim Volkan Kaya, Erkay Savas, Albert Levi and Ozgur Ercetin, "Public key cryptography based privacy preserving multi-context RFID infrastructure," Ad Hoc Networks, Vol. 7, pp. 136-152, Jan. 2009. https://doi.org/10.1016/j.adhoc.2007.12.004
- H.S. Ahn, E.J. Yoon, I.G. Nam, "Privacy Preserving and Relay Attack Preventing Multi-Context RFID Mutual Authentication Protocol," Journal of KICS, Vol. 36, No. 8, pp. 1028-1037, Aug. 2011. https://doi.org/10.7840/KICS.2011.36B.8.1028
- N. Borselius, "Mobile Agent Security," Electronics and Communication Engineering Journal, vol. 14, no. 5, pp. 211-218, Oct. 2002. https://doi.org/10.1049/ecej:20020504
- A. Juels, "RFID Security and Privacy: A Research Survey," IEEE Journal of Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, Feb. 2006. https://doi.org/10.1109/JSAC.2005.861395
- A. Juels, R.L. Rivest, M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy," 10th ACM Computer and Communications Security Conference (CCS'03), pp. 103-111, Oct. 2003.
- S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," In Security in Pervasive Computing, LNCS 2802, pp.201-212, 2005.
- M. Ohkubo, K. Suzuki, and S. Kinoshita, "A Cryptographic Approach to "Privacy-Friendly" tag," RFID Privacy Workshop, 2003.
- A. Juels, R. Pappu, "Squealing Euros : Privacy protection in RFID-enabled banknotes," Financial cryptography International conference, LNCS 2742, pp.103-123, 2003.
- P. Golle, M. Jakobsson, A. Juels, and P. Syverson, "Universal Re-encryption for mixnets," RSA Conference Cryptographers Track '04, LNCS 2964, pp.163-178, 2003.
- Y.S. Kang, Y.J. Choi, D.H. Choi, S.Y. Lee, H.S. Lee, "Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems," Journal of KICS, Vol. 20, No. 4, pp. 117-134, Aug. 2010.
- M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong Authentication for RFID Systems Using the AES Algorithm," Cryptographic Hardware and Embedded Systems, LNCS 3156, pp.85-140, 2004.
- T. Good, M. Benaissa, "A low-frequency RFID to challenge security and privacy concerns," Proceedings of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS'09), pp. 856-863 Oct. 2009.
- M. Kim, J. Ryou, Y. Choi and S. Jun, "Low-cost Cryptographic Circuits for authentication in Radio Frequency Identification Systems," Proceedings of International symposium on Consumber Electronics (ISCE'06), pp. 1-5, Jun. 2007.
- A. Kerckhoffs, "La cryptographie militaire," Journal des sciences militaires, vol. 9, pp.5-83, Jan. 1883. (http://petitcolas.net/fabien/kerckhoffs/)
- EPCTM Generation 1 Tag Data Standards Version 1.1 Rev.1.27, EPCglobal, Standard Specification, May 2005.