TY - JOUR AU - Jules, A. AU - Garfinkel, S. AU - Pappu, R. PY - 2005 DA - 2005// TI - RFID privacy: an overview of problems and proposed solutions JO - IEEE Security Privacy VL - 3 UR - https://doi.org/10.1109/MSP.2005.78 DO - 10.1109/MSP.2005.78 ID - Jules2005 ER - TY - JOUR AU - Jules, A. PY - 2006 DA - 2006// TI - RFID security and privacy: a research survey JO - IEEE J Sel Areas Commun VL - 24 UR - https://doi.org/10.1109/JSAC.2006.869953 DO - 10.1109/JSAC.2006.869953 ID - Jules2006 ER - TY - JOUR AU - Want, R. PY - 2005 DA - 2005// TI - An introduction to RFID technology JO - IEEE Pervasive Comput VL - 5 UR - https://doi.org/10.1109/MPRV.2006.2 DO - 10.1109/MPRV.2006.2 ID - Want2005 ER - TY - CHAP AU - Prabhu, B. S. AU - Su, X. AU - Ramamurthy, H. AU - Chu, C. AU - Gadh, R. PY - 2008 DA - 2008// BT - WinRFID-a middleware for the enablement of radio frequency identification (RFID) based applications UCLA PB - Wireless Internet for the Mobile Enterprise Consortium (WINMEC) CY - Los Angeles, CA ID - Prabhu2008 ER - TY - STD TI - EPCglobal Web site, 2005. Referenced 2005, [http://www.EPCglobalinc.org] UR - http://www.EPCglobalinc.org ID - ref5 ER - TY - JOUR AU - Sarma, S. AU - Weis, S. AU - Engels, D. PY - 2003 DA - 2003// TI - Radio-frequency identifcation: security risks and challenges JO - CryptoBytes VL - 6 ID - Sarma2003 ER - TY - CHAP AU - Juels, A. AU - Rivest, R. L. AU - Szudlo, M. PY - 2003 DA - 2003// TI - The blocker tag: selective blocking of RFID tags for consumer privacy BT - the 8th ACM Conference on Computer and Communications Security PB - ACM Press CY - Washington DC, USA ID - Juels2003 ER - TY - CHAP AU - Weis, S. A. AU - Sarma, S. E. AU - Rivest, R. L. AU - Engels, D. W. PY - 2004 DA - 2004// TI - Security and privacy aspects of low-cost radio frequency identification systems BT - Security in Pervasive Computing UR - https://doi.org/10.1007/978-3-540-39881-3_18 DO - 10.1007/978-3-540-39881-3_18 ID - Weis2004 ER - TY - JOUR AU - Chien, H. AU - Chen, C. PY - 2007 DA - 2007// TI - Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards JO - Comput Standard Interface VL - 29 UR - https://doi.org/10.1016/j.csi.2006.04.004 DO - 10.1016/j.csi.2006.04.004 ID - Chien2007 ER - TY - CHAP AU - Ohkubo, M. AU - Suzki, K. AU - Kinoshita, S. PY - 2003 DA - 2003// TI - Cryptographic approach to "privacy-friendly" tags BT - RFID Privacy Workshop, MIT, MA, USA ID - Ohkubo2003 ER - TY - CHAP AU - Henrici, D. AU - Muller, P. ED - Sandhu, R. ED - Thomas, R. PY - 2004 DA - 2004// TI - Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers BT - International Workshop on Pervasive Computing and Communication Security -PerSec 2004 ID - Henrici2004 ER - TY - CHAP AU - Lee, S. M. AU - Hwang, Y. J. AU - Lee, D. H. AU - Lim, J. I. PY - 2005 DA - 2005// TI - Efficient authentication for low-cost RFID systems BT - ICCSA05, LNCS ID - Lee2005 ER - TY - CHAP AU - Dimitriou, T. PY - 2005 DA - 2005// TI - A lightweight RFID protocol to protect against traceability and cloning attacks BT - Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm PB - Athens CY - Greece ID - Dimitriou2005 ER - TY - CHAP AU - Molnar, D. AU - Wagner, D. ED - Pfitzmann, B. ED - Liu, P. PY - 2004 DA - 2004// TI - Privacy and Security in Library RFID: Issues, Practices, and Architectures BT - Conference on Computer and Communications Security ID - Molnar2004 ER - TY - CHAP AU - Rhee, K. AU - Kwak, J. AU - Kim, S. AU - Won, D. PY - 2005 DA - 2005// TI - Challenge-response based RFID authentication protocol for distributed database environment BT - SPC 2005, LNCS 3450 ID - Rhee2005 ER - TY - JOUR AU - Choi, E. Y. AU - Lee, S. M. AU - Lee, D. H. PY - 2005 DA - 2005// TI - Efficient RFID authentication protocol for ubiquitous computing environment JO - Embed Ubiquit Comput VL - 3832 ID - Choi2005 ER - TY - JOUR AU - Ha, J. AU - Moon, S. AU - Nieto, J. M. G. AU - Boyd, C. PY - 2007 DA - 2007// TI - Security analysis and enhancement of one-way hash based low-cost authentication protocol JO - Emerging Technol Knowl Disc Data Mining VL - 4819 UR - https://doi.org/10.1007/978-3-540-77018-3_57 DO - 10.1007/978-3-540-77018-3_57 ID - Ha2007 ER - TY - CHAP AU - Tsudik, G. ED - Borisov, N. ED - Golle, P. PY - 2007 DA - 2007// TI - A family of dunces: trivial RFID identification and authentication protocols BT - 7th International Symposium on Privacy Enhancing Technologies-PET 2007, Lecture Notes in Computer Science PB - Ottawa CY - Canada ID - Tsudik2007 ER - TY - CHAP AU - Karthikeyan, S. AU - Nesterenko, N. PY - 2005 DA - 2005// TI - RFID security without extensive cryptography BT - Workshop on Security of Ad Hoc and Sensor Networks - SASN'05 PB - ACM Press CY - Alexandria, Virginia, USA UR - https://doi.org/10.1145/1102219.1102229 DO - 10.1145/1102219.1102229 ID - Karthikeyan2005 ER - TY - CHAP AU - Song, B. AU - Mitchell, C. J. PY - 2008 DA - 2008// BT - RFID authentication protocol for low-cost tags PB - WiSEC'08 CY - Alexandria, Virginia, USA ID - Song2008 ER - TY - CHAP AU - Song, B. PY - 2008 DA - 2008// TI - RFID tag ownership transfer BT - 4thWorkshop on RFID Security, RFIDsec08 PB - Budaperst CY - Hungary ID - Song2008 ER - TY - CHAP AU - Cai, S. AU - Li, Y. AU - Li, T. AU - Deng, R. H. PY - 2009 DA - 2009// TI - Attacks and improvements to an RFID mutual authentication protocol and its extensions BT - WiSec'09 PB - Zurich CY - Switzerland UR - https://doi.org/10.1145/1514274.1514282 DO - 10.1145/1514274.1514282 ID - Cai2009 ER - TY - CHAP AU - Morshed, M. M. AU - Yu, H. AU - Atkins, A. AU - Ahamed, S. I. AU - Akbar, M. M. PY - 2010 DA - 2010// TI - A two-way RFID authentication protocol in pervasive computing BT - The 16th International Conference on Automation and Computing (ICAC'10) PB - Birmingham University CY - UK ID - Morshed2010 ER -