|
[1]Alexander Ilic, Florian Michahelles, Elgar Fleisch,“Access Management for Shared Item Information in RFID-enabled Supply Chains”, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2007. [2]C.M. Roberts, “Radio frequency identification (RFID), “Computers & Security, vol.25, pp.18-26, 2006. [3]Doo Ho Choi, Tae Sung Kim, Ho Won Kim, “Privacy Protection for Secure Mobile Service”, 2006 1st International Symposium on Wireless Pervasive Computing, 16-18 Jan. 2006. [4]Hyangjin Lee and Jeeyeon Kim, “Privacy threats and issues in mobile RFID”, The First International Conference on Availability, Reliability and Security, 20-22 April 2006. [5]Hong Lei and Tianjie Cao, “RFID Protocol enabling Ownership Transfer to protect against Traceability and DoS attacks”, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE), 1-3 Nov. 2007, pp.508 – 510. [6]H.G Lee and J.Y Kim, “Privacy threats and issues in mobile RFID”, Proceedings of the First International Conference on Availability, Reliability and Security, 2006. [7]Juels, “RFID Security and Privacy: A Research Survey”, IEEE -Journal on Selected Areas in Communications, vol. 24, no. 2, February 2006. [8]M.J.B Robshaw, “An overview of RFID tags and new cryptographic developments”, information security technical report II, 2006, pp.82–88 [9]Yingjiu Li and Xuhua Ding, “Protecting RFID Communications in Supply Chains”, Proceedings of the 2nd ACM symposium on Information, computer and communications security (ASIACCS ''07) , 2007 , pp.234-241. [10]Youngjoon Seo, Tomoyuki Asano, Hyunrok Lee, Kwangjo Kim, “A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags”, The 2007 Symposium on Cryptography and Information Security, 2007. [11]Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki and Osamu Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer”, 2006 International Conference on Computational Intelligence and Security, Volume 2, 3-6 Nov. 2006, pp.1090-1095. [12]K.H.S. Sabaragamu Koralalage, S. Mohammed Reza, J. Miura, Y. Goto, and J. Cheng, “POP Method: An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism”, Proceedings of the 2007 ACM symposium on Applied computing(SAC ''07), 2007, pp.270-275. [13]Kim, Il Jung, Choi, Eun Young; Lee, Dong Hoon, “Secure Mobile RFID system against privacy and security problems”, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007, pp.67-72 [14]Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer”, International Conference on Computational Intelligence and Security, 2006. [15]Soo-CheolKim, Sang-Soo Yeo and Sung Kwon Kim, “MARP:Mobile Agent for RFID Privacy Protection”, 7th Smart Card Research and Advanced Application IFIP Conference, 2006. [16]S.Shepard, “RFID-Radio Frequency Identification”, The McGraw-Hill companies, 2005. [17]S.Garfinkel,“An RFID Bill of Rights”, Technology Review, pp.35,October, 2002. [18]N.C. Wu, M.A. Nystrom, T.R. Lin, H.C. Yu, “ Challenges to global RFID adoption” , Technology Management for the Global Future, 2006. [19]EPCglobal , http://www.epcglobalinc.org/home. [20]EPCglobal TAIWAN, http://www.gs1tw.org/twct/web/indes.jsp. [21]EPCglobal,http://www.epcglobalinc.org/standards/uhfc1g2/uhfc1g2_1_1_0-standard-20071017.pdf ,“EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz – 960 MHz Version 1.1.0” , Tech.Rep., January 2007 [21]White Paper: RFID Basics for Retailers,http://viewer.bitpipe.com/viewer/viewer.do.
|