BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
[32] Vance Lockton and Richard Rosenberg. Rfid: The next serious threat to privacy.<br />
Ethics and Information Technology, 7(4):221–231, December 2005.<br />
[33] Elgar Fleisch Marin Strassner. The promise of auto-id in the automotive indus-<br />
try. Technical report, Auto-ID Labs, May 2003.<br />
[34] L. Mats, J. T. Cain, and M. H. Mickle. Analysis and synthesis of rfid equiva-<br />
lent circuits through backscatter and ars. In RFID, 2007. IEEE International<br />
Conference on, pages 49–56, 2007.<br />
[35] Ultan Mc Carthy, Gashaw Ayalew, Francis Butler, Kevin Mcdonnell, and Shane<br />
Ward. Impact of reader antenna polarisation, distance, inlay design, conveyor<br />
speed, tag location and orientation on the coupling of uhf rfid as applied to<br />
modified atmosphere packaged meat. Computers and Electronics in Agriculture,<br />
August 2009.<br />
[36] Luke Mirowski, Jacqueline Hartnett, and Raymond Williams. An rfid attacker<br />
behavior taxonomy. IEEE Pervasive Computing, 8(4):79–84, 2009.<br />
[37] P. Nikitin and K.V Rao. Theory and measurement of backscattering from rfid<br />
tags. IEEE-Antennas and Propagation Magazine, 48(6):212–218, 2006.<br />
[38] M. Ohkubo, K. Suzuki, and S. Kinoshita. Rfid privacy issues and technical<br />
challenges. ACM Commununication Journal, 48(9):66–71, 2005.<br />
[39] Radu I. Paise and Serge Vaudenay. Mutual authentication in rfid: security<br />
and privacy. In ASIACCS ’08: Proceedings of the 2008 ACM symposium on<br />
Information, computer and communications security, pages 292–299. ACM, 2008.<br />
[40] S. Pete. Passive rfid basics.<br />
[41] S. J. Plimpton and W. E. Lawton. A very accurate test of coulomb’s law of force<br />
between charges. 50, 1936.<br />
98