SLIDE 54 http://csce.uark.edu/~ drt/rfid http://csce.uark.edu/~ drt/rfid 54 54
References References
- N. Chaudhry, D. R. Thompson, and C. Thompson,
- N. Chaudhry, D. R. Thompson, and C. Thompson, RFID Technical Tutorial and Threat Modeling
RFID Technical Tutorial and Threat Modeling, , ver
- ver. 1.0, tech. report, Dept. of Computer Science and Computer Engi
. 1.0, tech. report, Dept. of Computer Science and Computer Engineering, University of neering, University of Arkansas, Fayetteville, Arkansas, Dec. 8, 2005. Available: http: Arkansas, Fayetteville, Arkansas, Dec. 8, 2005. Available: http:// // csce.uark.edu/~ drt/rfid csce.uark.edu/~ drt/rfid
- S. Bono, M. Green, A. Stubblefield, A.
- S. Bono, M. Green, A. Stubblefield, A. Juels
Juels, A. Rubin, and M. , A. Rubin, and M. Szydlo Szydlo, , “ “Security analysis of a Security analysis of a cryptographically cryptographically-
enabled RFID device,” ” in in Proc.14th USENIX Security Symposium Proc.14th USENIX Security Symposium, Baltimore, , Baltimore, MD, USA, July MD, USA, July-
- Aug. 2005, pp. 1
- Aug. 2005, pp. 1-
- 16.
16.
- EPCglobal Inc., http://www.epcglobalinc.org/
EPCglobal Inc., http://www.epcglobalinc.org/
EPC Radio-
- Frequency Identity Protocols Class
Frequency Identity Protocols Class-
1 Generation-
2 UHF RFID Protocol for Communications at 860 MHz Communications at 860 MHz – – 960 MHz 960 MHz, , ver
- ver. 1.0.9, EPCglobal Inc., Jan. 31, 2005. Available:
. 1.0.9, EPCglobal Inc., Jan. 31, 2005. Available: http://www.epcglobalinc.org/ http://www.epcglobalinc.org/ . .
Finkenzeller, , RFID Handbook: Fundamentals and Applications in RFID Handbook: Fundamentals and Applications in Contactless Contactless Smart Cards and Smart Cards and Identification Identification, R. Waddington, Trans., , R. Waddington, Trans., 2nd ed 2nd ed. ., Hoboken, New Jersey: John Wiley & Sons, 2003. , Hoboken, New Jersey: John Wiley & Sons, 2003.
Garfinkel and B. Rosenberg, Eds., and B. Rosenberg, Eds., RFID: Applications, Security, and Privacy RFID: Applications, Security, and Privacy, Upper Saddle , Upper Saddle River, New Jersey: Addison River, New Jersey: Addison-
Wesley, 2006.
Karthikeyan and M. and M. Nesterenko Nesterenko, , “ “RFID security without expensive cryptography, RFID security without expensive cryptography,” ” in in Proc. ACM
Workshop on Security of Ad Hoc and Sensor Networks (SASN) Workshop on Security of Ad Hoc and Sensor Networks (SASN), Alexandria, VA, USA, Nov. 2005, , Alexandria, VA, USA, Nov. 2005,
67.
- Opinion Research Corporation and Alan F. Westin.
Opinion Research Corporation and Alan F. Westin. "Freebies" and Privacy: What Net Users Think. "Freebies" and Privacy: What Net Users Think. Sponsored by Privacy & American Business. Hackensack, NJ: P & AB Sponsored by Privacy & American Business. Hackensack, NJ: P & AB, July 1999. Available: , July 1999. Available: http:// http:// www.privacyexchange.org www.privacyexchange.org
Rieback, B. , B. Crispo Crispo, and A. S. , and A. S. Tanenbaum Tanenbaum, , “ “Is your cat infected with a computer virus?, Is your cat infected with a computer virus?,” ” in in
- Proc. IEEE Int
- Proc. IEEE Int’
’l. Conf. Pervasive Computing and Communications (
- l. Conf. Pervasive Computing and Communications (PerCom
PerCom) ), Pisa, Italy, Mar. 13 , Pisa, Italy, Mar. 13-
17, 2006.
Verichip, , http:// http:// www.verichipcorp.com www.verichipcorp.com/ /