[1]
Garfinkel S L,Juels A,Pappu R,RFID Privacy:An Overview of Problems and Proposed Solutions[J].Security & Privacy Magazine,IEEE,2005,3(3):34~43.
DOI: 10.1109/msp.2005.78
Google Scholar
[2]
Ari Juels,Ronald L,Rivest,Michael Szydlo. The Blocker Tag:Selective Blocking of RFID Tags for Consumer Privacy[M].ACM Press,2003:103~111.
DOI: 10.1145/948109.948126
Google Scholar
[3]
Gunter Karjoth,Paul A.MOskowitz.Disabling RFID Tags with Visible Confirmation:Clilpped Tags Are Silenced[M]. ACM Press,2005,27~30.
DOI: 10.1145/1102199.1102205
Google Scholar
[4]
Turban E,Wetherbe J, Mclean, E. Information Technology for Management: Improving Quality and Productivity.New York:John Wiley and Sons,1996.
Google Scholar
[5]
Dacier M, Deswarte Y , Ka^aniche M.Quantitative Assessment of Operational Security:Models and Tools[R].Laboratory for Analysis and Architecture of System,National Center for Scientific Research (LAAS-CNRS),1996.
Google Scholar
[6]
Helmer G, Wong J, Slagell M,et al. Software Fault Tree and Colored Petri Net Based Specification,Design and Impementation of Agent-Based Intrusion Detection System.Requirements Engineering,2000,7(4):207~220.
DOI: 10.1007/s007660200016
Google Scholar
[7]
Bilar D. Quantitatie Risk Analysis of Computer Networks.Hanover,New Hampshire:Thayer School of Engineering,Dart mouth University,2003.
Google Scholar
[8]
You Zhanqing, Liu Kesheng, Wu Xiang, Lin Hanhong. Radio Frequency Identification (RFID) and Barcode Technology[M]. Machinery Industry Press .2007.1(in Chinese)
Google Scholar
[9]
Peng Zhiwei.RFID Security and Privacy[J].Communication Technology.2007.8 (4):28-33.(in Chinese)
Google Scholar