Information Technology Reference
In-Depth Information
22. Devadas, S., Suh, E., Paral, S., et al.: Design and Implementation of PUF-Based “Un-
clonable” RFID ICs for Anti-Counterfeiting and Security Applications. In: IEEE Interna-
tional Conference on RFID, pp. 58-64 (2008)
23. Jeng, A.B., Chang, L.-C., Wei, T.-E.: Survey and Remedy of the Technologies used for
RFID Tags Against Counterfeiting. International Conference on Machine Learning and
Cybernetics 5, 2975-2981 (2009)
24. Abawajy, J.: Enhancing RFID Tag Resistance Against Cloning Attack. In: Third Interna-
tional Conference on Network and System Security, pp. 18-23 (2009)
25. Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA
2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
26. Juels, A.: Strengthening EPC Tags Against Cloning. In: Proceedings of the 4th ACM
Workshop on Wireless Security, pp. 67-76 (2005)
27. Duc, D.N., Park, J., Lee, H., et al.: Enhancing Security of EPCglobal Gen-2 RFID Tag
Against Traceability and Cloning (2006)
28. Laurie, A.: Practical Attacks Against RFID. Network Security 2007, 4-7 (2007)
29. Mirowski, L.T., Hartnett, J.: Deckard: A System to Detect Change of RFID Tag Owner-
ship. IJCSNS International Journal of Computer Science and Network Security 7, 87-98
(2007)
30. Zanetti, D., Fellmann, L., Capkun, S.: Privacy-Preserving Clone Detection for RFID-
Enabled Supply Chains. In: IEEE International Conference on RFID 2010, pp. 37-44
(2010)
31. Khor, J.H., Ismail, W., Younis, M.I., et al.: Security Problems in an RFID System. Wire-
less Pers. Commun. 1(10) (2010)
32. Clarke, J.: Platform-Level Defenses. In: Anonymous SQL Injection Attacks and Defense,
pp. 377-413. Syngress, Boston (2009)
33. Clarke, J.: Code-Level Defenses. In: Anonymous SQL Injection Attacks and Defense, pp.
341-376. Syngress, Boston (2009)
Search WWH ::




Custom Search