Author:
Hu Qiao,Dinca Lavinia Mihaela,Hancke Gerhard
Publisher
Springer International Publishing
Reference16 articles.
1. Grover, A., Berghel, H.: A Survey of RFID Deployment and Security Issues. Journal of Information Processing Systems 7, 561–580 (2011)
2. Hancke, G.P., Markantonakis, K., Mayes, K.E.: Security Challenges for User-Oriented RFID Applications within the Internet of Things. Journal of Internet Technology 11(3), 307–313 (2010)
3. Huo, F., Yang, C., Gong, G., Poovendran, R.: A framework to securing RFID transmissions by varying transmitted reader’s power. In: 9th Workshop on RFID Security, pp. 57–68. IOS Press, Amsterdam (2013)
4. Archard, F., Savry, O.: Cross-layer approach to preserve privacy in RFID ISO/IEC 15693 systems. In: 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 85–90. IEEE (2012)
5. Hancke, G.: Practical Eavesdropping and Skimming Attacks on High-Frequency RFID Tokens. Journal of Computer Security 19, 259–288 (2011)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献