[1]
Dang Nguyen Duc; Hyunrok Lee; Konidala, D.M.; Kwangjo Kim Open Issues in RFID Security, in Proc. Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference, Nov. 2009, pp.1-5.
DOI: 10.1109/icitst.2009.5402510
Google Scholar
[2]
Shao Xiwen, Study on Security Issue of Internet of Things based on RFID, Proc. IEEE 2012 Fourth International Conference on Computational and Information Sciences(ICCIS), IEEE Press, Aug. 2012, p.566–569, doi: 10. 1109/ICCIS. 2012. 301.
DOI: 10.1109/iccis.2012.301
Google Scholar
[3]
Pateriya, R.K.; Sharma, S. The Evolution of RFID Security and Privacy: A Research Survey, in Proc. Communication Systems and Network Technologies (CSNT), June 2011, p.115 – 119, doi: 10. 1109/CSNT. 2011. 31.
DOI: 10.1109/csnt.2011.31
Google Scholar
[4]
Khoo, B. , RFID as an Enabler of the Internet of Things: Issues of Security and Privacy, in Proc. 2011 4th International Conference on Cyber, Physical and Social Computing, p.709 – 712, doi: 10. 1109/iThings/CPSCom. 2011. 83.
DOI: 10.1109/ithings/cpscom.2011.83
Google Scholar
[5]
LI U Li min , X IAO De bao, LI L in , SH UI Hai hong Information Security and Its Countermeasures of RFID System of Internet of Things Sensing Layer, JOURNAL OF WUHAN UNIVERSITY OF TECHNOLOGY, Vo l. 32. No. 20. Oct. 2010, pp.79-87.
Google Scholar
[6]
Serge Vaudenay , On Privacy Models for RFID, Advances in Cryptology – ASIACRYPT 2007, Lecture Notes in Computer Science Vol. 4833, pp.68-87, (2007).
DOI: 10.1007/978-3-540-76900-2_5
Google Scholar
[7]
Ton van Deursen, 50 Ways to Break RFID Privacy, IFIP AICT(Advances in Information and Communication Technology) Vol. 352, p.192–205, (2011).
DOI: 10.1007/978-3-642-20769-3_16
Google Scholar
[8]
Tao Yan, Qiaoyan Wen , A Secure Mobile RFID Architecture for the Internet of Things, Proc. IEEE Information Theory and Information Security (ICITIS), IEEE Press, Dec. 2010 , p.616 – 619, doi: 10. 1109/ICITIS. 2010. 5689514.
DOI: 10.1109/icitis.2010.5689514
Google Scholar
[9]
Xiaolin Jia, Quanyuan Feng, Taihua Fan, Quanshui Lei, RFID Technology and Its Applications in Internet of Things (IOT), in Proc. 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), April 2012, p.1282.
DOI: 10.1109/cecnet.2012.6201508
Google Scholar
[10]
Juels, R. L. Rivest, and M. Szydlo, The blocker tag: Selective blocking of RFID tags for consumer privacy, in Proc. 8th ACM Conf. Comput. Commun. Security, V. Atluri, Ed., 2003, p.103–111.
DOI: 10.1145/948109.948126
Google Scholar