:::

詳目顯示

回上一頁
題名:RFID的安全與隱私保護
書刊名:明新學報
作者:葉慈章 引用關係劉耀元吳建宏
作者(外文):Yeh, Tzu-changLiu, Yao-yuanWu, Chien-hung
出版日期:2008
卷期:34:2
頁次:頁183-198
主題關鍵詞:安全隱私RFIDSecurityPrivacy
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:18
期刊論文
1.Konstan, H.、Pohl, H.(2004)。RFID Security。Information Security Technical Report,9,39-50。  new window
2.Ohkubo, M.、Suzuki, K.、Kinoshita, S.(2005)。RFID Privacy Issues and Technical Challenges。Communications of the ACM,48(9),66-71。  new window
3.Alfonsi, B. J.(2004)。Privacy Debate Centers on Radio Frequency Identification。IEEE Security & Privacy,2(2),12。  new window
4.Ayoade, John(2005)。Security implications in RFID and authentication processing framework。Computers & Security,25(3),207-212。  new window
5.Bansal, R.(2004)。Microwave Surfing。IEEE microwave magazine,9(2),28-30。  new window
6.Bridgelall, R.(2003)。Enabling Mobile Commerce Through Pervasive Communications with Ubiquitous RF Tags。IEEE Wireless Communications and Networking Conference : WCNC,3,2041-2046。  new window
7.Knight, William(2006)。RFID-another technology,another security mess?。Infosecurity Today,3(3),35-37。  new window
8.Ortiz, S. Jr.(2006)。How Secure Is RFID?。Computer,39(7),17-19。  new window
9.Lin, H. C.、Leu, H.(200512)。Using AHP Approach to Establish a Decision Analysis Mechanism for Adopting RFID Systems。Communications of IICM,8(4)。  new window
10.Roy, W.(2004)。Enabling Ubiquitous Sensing with RFID。Computer,37(4),84-86。  new window
11.Traub, K.(2005)。ALE: A New Standard for Data Access。RFID Journal。  new window
12.Phillips, Ted、Karygiannis, Tom、Kuhn, Rick(2005)。Security Standards for the RFID Market。IEEE Security and Privacy,3(6),85-89。  new window
13.Ni, L. M.、Liu, Y. H.、Lau, Y. C.、Patil, A. P.(2004)。LANDMARC: Indoor Location Sensing Using Active RFID。Wireless Networks,10(6),701-710。  new window
14.Piramuthu, S.(2007)。Protocols for RFID tag/reader authentication。Decision Support Systems,43(3),897-914。  new window
會議論文
1.Song, B.、Mitchell, C. J.(2008)。RFID authentication protocol for low-cost tags。First ACM Conference on Wireless Network Security,140-147。  new window
2.Karjoth, G.、Moskowitz, P. A.(2005)。Disabling RFID Tags with visible confirmation: Clipped Tags are silenced。The ACM Workshop on Privacy in the Electronic Society,27-30。  new window
3.Alippi, C.、Vanini, G.(2004)。A Genetic-based Application Oriented Approach to Optimize RFID-like Passive Sensor Devices for Homeland Security。2004 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety,81-86。  new window
4.Conti, M.、Pietro, R. D.、Mancini, L. V.、Spognardi, A.(2007)。RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy。Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2007,229-234。  new window
5.Henrici, D.、Muller, P.(2004)。Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers。Second IEEE Annual Conference on Pervasive Computing and Communications Workshops,,149-153。  new window
6.Huang, X.(2008)。Quantifying Information Leakage in RFID Systems。10th International Conference on Advanced Communication Technology,84-89。  new window
7.Inoue, S.、Konomi, S.、Yasuura, H.(2002)。Privacy in the Digitally Named World with RFID Tags。Workshop on Socially-Informed Design of Privacy-Enhancing Solutions in Ubiquitous Computing。  new window
8.Kinosita, S.、Hoshino, F.、Komuro, T.、Fujimura, A.、Ohkubo, A.(2005)。Non-identifiable Anonymous-ID Scheme for RFID Privacy Protection。CSS'03,497-502。  new window
9.Staake, T.、Thiesse, F.、Fleisch, E.(2005)。Extending the EPC Network--The Potential of RFID in Anti-counterfeiting。2005 ACM symposium on Applied computing,1607-1612。  new window
10.Zhai, J.、Park, C. M.、Wang, G. N.(2006)。Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure。Computational Science and Its Applications-ICCSA 2006,296-305。  new window
11.Inoue, S.、Yasuura, H.(2003)。RFID Privacy Using User-Controllable Uniqueness。RFID Privacy Workshop@MIT。  new window
12.Juels, A.、Rivest, R. L.、Szydlo, M.(2003)。The blocker tag: selective blocking of RFID tags for consumer privacy。8th ACM Conference on Computer and Communications Security,(會議日期: 2003/10/27-10/30)。Washington:Association for Computing Machinery。103-111。  new window
13.Weis, S. A.、Sarma, S. E.、Rivest, R.、Engels, D. W.。Security and privacy aspects of low-cost radio frequency identification systems。1st Security in Pervasive Computing,201-212。  new window
14.Karthikeyan, S.、Nesterenko, M.(2005)。RFID security without extensive cryptography。3rd ACM Workshop on Security of Ad Hoc and Sensor Networks,(會議日期: 2005/11/07)。Alexandria, VA:Hilton Alexandria Mark Center。63-67。  new window
15.Gao, X.、Xiang, Z.、Wang, H.、Shen, J.、Huang, J.、Song, S.(2004)。An Approach to Security and Privacy of RFID System for Supply Chain。2004 IEEE International Conference on E-Commerce Technology for Dynamic E-Business,(會議日期: 2004/09/13-15)。Beijing, China。164-168。  new window
研究報告
1.Auto-ID Center(2002)。860Mhz-960Mhz Class I Radio Frequency Identification Tag & Local Communication Interface Specification Proposed Recommendation Version 1.0.0。  new window
圖書
1.奚正德、張克章(2006)。RFID相關應用與安全機制簡介。長庚大學。  延伸查詢new window
2.莊裕澤、王蒼仁、簡雄飛(2005)。RFID簡介。台灣大學。  延伸查詢new window
3.鄭同伯(2004)。RFID EPC無線射頻辨識完全剖析。台北縣:博碩文化。  延伸查詢new window
4.Thornton, F.、Haines, B.、Das, A. M.(2006)。RFID Security--Chapter 3 Threat and Target Identification。Syngress。  new window
5.日經BP RFID編輯部、周湘琪(2004)。RFID技術與應用。旗標出版股份有限公司。  延伸查詢new window
其他
1.王明德(20050624)。RFID全面參與企業生產流程。  延伸查詢new window
2.王玫文(20040322)。國際標準底定RFID市場起飛。  延伸查詢new window
3.何玉美(20040319)。RFID帶給半導體業者無限商機。  延伸查詢new window
4.鄭吉宏(20040319)。RFID為全球163.8億個貨品換發身分證。  延伸查詢new window
5.鄭吉宏(20040319)。何謂RFID。  延伸查詢new window
6.鄭吉宏(20040310)。昇陽積極布署臺灣RFID商機。  延伸查詢new window
7.鄭吉宏(20040319)。臺灣RFID的機會不只在晶片。  延伸查詢new window
8.謝穎青,葉志良(200505)。如何解決RFID侵害隱私的疑慮,http://taiwan.cnet.com/enterprise/column/0,2000062893,20098982,00.htm。  延伸查詢new window
9.Duri, S.(2005)。Application Level Events (ALE) Preview for RFID,http://www.alphaworks.ibm.com/tech/alepreview。  new window
10.Rose, M. T.,Barvick, S.(2005)。Simple Lightweight RFID Reader Protocol (slrrp),http://www3.ietf.org/proceedings/05mar/slrrp.html。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE