共 41 条
[1]
Sarma S.E., Weis S.A., Engels D.W., RFID systems and security and privacy implications, CHES 2002. LNCS, 2523, pp. 454-469, (2003)
[2]
Dietrich K., Anonymous RFID authentication using trusted computing technologies, RFIDSec 2010. LNCS, 6370, pp. 91-102, (2010)
[3]
Kumar A., Arora A., Islam C.J., Near Field Communication(NFC): An expertise primer, Discovery, 2, 4, pp. 20-25, (2012)
[4]
Dardari D., D'Errico R., Roblin C., Sibille A., Win M.Z., Ultrawide bandwidth RFID: The next generation?, Proceedings of the IEEE, 98, 9, pp. 1570-1582, (2010)
[5]
Zou Z., Baghaei-Nejad M., Tenhunen H., Zheng L.R., An efficient passive RFID system for ubiquitous identification and sensing using impulse UWB radio. e & I Elektrotechnik und Informationstechnik, 124, 11, pp. 397-403, (2007)
[6]
Grunwald L., New attacks against RFID-systems, (2006)
[7]
Rieback M.R., Simpson P.N., Crispo B., Tanenbaum A.S., RFID Malware: Design principles and examples, Pervasive and Mobile Computing, 2, 4, pp. 405-426, (2006)
[8]
Shankarapani M.K., Sulaiman A., Mukkamala S., Fragmented malware through RFID and its defenses, Journal in Computing Virology, 5, 3, pp. 187-198, (2009)
[9]
Armstrong H.L., Forde P.J., Internet anonymity practice in computer crime, Information Management and Computer Security, 11, 5, pp. 209-215, (2003)
[10]
Barber R., Hacking techniques: The tools that hackers use, and how they are evolving to become more sophisticated, Computer Fraud & Security, 2001, 3, pp. 9-12, (2001)