|
1.D. Henrici and P. Müller “Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers.” Proceedings 2nd of the IEEE Annul Conference on Pervasive Computing and Communications Workshops (PERCOMW’04), 2004. 2.M.N. Huda, S. Yamada and E. Kamioka “Privacy protection in mobile agent based service domain” Information Technology and Applications, 2005. ICITA 2005. Third International Conference on Volume 2, 4-7 July 2005, pp. 482-487. 3.S. Inoue and H. Yasuura, “Toward the Digitally Named World with Security and Convenience Using RFID Tags”, Research Reports on Information Science and Electrical Engineering of Kyushu University. Vol. 7, No. 2, September 2002. 4.W. Jansen and T Karygiannis “NIST Special Publication 800-19 - Mobile Agent Security” Technical Report MD 20899, National Institute of Standards and technology Computer Security Division Gaithersburg, 1999. 5.H.W. Kim, S.Y. Lim, H.J. Lee “Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security” Hybrid Information Technology, 2006. ICHIT''06. Vol. 2. International Conference on Volume 2, pp. 718-723, 2006. 6.D.B. Lange and M. Oshima “Seven good reasons for mobile agents” March 1999 Communications of the ACM, Volume 42 Issue 3 1999. 7.Y.Z. Li, Y.B. Cho, N.K. Um and S.H. Lee “Security and Privacy on Authentication Protocol for Low-cost RFID” Computational Intelligence and Security, 2006 International Conference on Volume 2, 3-6 Nov. 2006 , pp. 1101-1104. 8.A. Masters, K. Michael “Humancentric Applications of RFID Implants: The Usability Contexts of Control, Convenience and Care” Mobile Commerce and Services, 2005. WMCS ''05, pp.32-41, 2005. 9.J. Ma, A. Nakamura and R. Huang ”A Random ID Update Scheme to Protect Location Privacy in RFID-based Student Administration Systems” Database and Expert Systems Applications, Aug. 2005, pp. 22-26. 10.P.J. Marques, L.M. Silva and J.G. Silva “Security mechanisms for using mobile agents in electronic commerce” Reliable Distributed Systems, 1999. Proceedings of the 18th IEEE Symposium on 19-22 Oct 1999, pp. 378-383. 11.K. Osaka, T. Takagi, K. Yamazaki, O. Takahashi “An Efficient and Secure RFID Security Method with Ownership Transfer” Computational Intelligence and Security, 2006 International Conference on Volume 2, 3-6 Nov, pp. 1090-1095, 2006. 12.N. Park, H. Kim, K. Chung and S. Sohn “Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems” Consumer Electronics, 2006. ISCE ''06. 2006 IEEE Tenth International Symposium , pp. 1-6, 2006. 13.N. Park, H. Lee, H. Kim and D. Won ”A Security and Privacy Enhanced Protection Scheme for Secure 900MHz UHF RFID Reader on Mobile Phone” Consumer Electronics, 2006. ISCE ''06. 2006 IEEE Tenth International Symposium , pp. 1-5, 2006. 14.J. Saito, J.C. Ryou and K. Sakurai, ”Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags”, L. T. Yang et al. (Eds.): EUC 2004, LNCS 3207, pp. 879-890, 2004. 15.S.A. Weis, S.E. Sanma, R.L. Rivest and D.W. Engels “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems” 16.Y.H. Wang, W.N. Wang, C.A. Wang and C. Cheng “An agent based e-marketplace over e-business” Cyber Worlds, 2002. Proceedings. First International Symposium on 6-8, Nov 2002 , pp. 303-310. 17.C. Wang and H.F. Leung “Mobile agents for secure electronic commerce transactions with privacy protection of the customers” e-Technology, e-Commerce and e-Service, 2005. EEE ''05. Proceedings. The 2005 IEEE International Conference on29 March-1 April 2005, pp. 530-535. 18.Pew Internet and American Life Project, http://www.pewinternet.org/ 19.RFID Technology, Privacy Issues, http://itpro.nikkeibp.co.jp/free/NBY/RFID/20040823/1/ 20.RFID wikipedia http://en.wikipedia.org/wiki/RFID 21.Census Bureau http://www.census.gov/ 22.Electronic Commerce and Consumer Privacy http://www.ffiec.gov/ffiecinfobase/resources/elect_bank/fdi-fil-86-98_e_commerce_consumer_priv.pdf
|