23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Grobler, M. M., & Von Solms, S. H. (2009, July 6-8). Best practice approach to<br />

live forensic acquisition. In H. Venter, M. Coetzee, & L. Labuschagne<br />

(Eds.), Proceed<strong>in</strong>gs of the Information Security for South Africa (ISSA)<br />

2009 Conference, 3-14. Pretoria, South Africa: Information Security for<br />

South Africa (ISSA).<br />

Guidance Software, Inc. (2010). EnCase® forensic version 6.17 user’s guide.<br />

Pasadena, CA, United States of America: Author.<br />

Ha<strong>in</strong>es, B. R. (2006a). <strong>RFID</strong> attacks: tag encod<strong>in</strong>g attacks. Syngress Force 2006<br />

Emerg<strong>in</strong>g Threat Analysis: From mischief of malicious (pp. 433-445).<br />

Rockland, MA: Syngress Publish<strong>in</strong>g, Inc.<br />

Ha<strong>in</strong>es, B. R. (2006b). <strong>RFID</strong> attacks: tag application attacks. Syngress Force 2006<br />

Emerg<strong>in</strong>g Threat Analysis: From mischief of malicious (pp. 447-460).<br />

Rockland, MA: Syngress Publish<strong>in</strong>g, Inc.<br />

Halamka, J., Juels, A., Stubblefield, A., & Westhues, J. (2006). The security<br />

implications of VeriChip clon<strong>in</strong>g. Journal of the American Medical<br />

Informatics Association, 13(5), 601-607.<br />

Harmon, C. K. (2006). The necessity for a uniform organization of user memory<br />

<strong>in</strong> <strong>RFID</strong>. International Journal of Radio Frequency Identification<br />

Technology and Applications, 1(1), 41-51.<br />

Harrill, D. C., & Mislan, R. P. (2007). A small scale digital device forensics<br />

Ontology. Journal of <strong>Small</strong> Scale <strong>Digital</strong> <strong>Forensics</strong>, 1(1), 1-7.<br />

Hendrickson, A. R., Mennecke, B., Scheibe, K., & Townsend, A. M. (2006,<br />

September). Feasibility and proof of concept of utiliz<strong>in</strong>g radio frequency<br />

identification tagg<strong>in</strong>g technology to manage evidentiary materials <strong>in</strong><br />

forensic laboratories. United States of America: author.<br />

Heydt-Benjam<strong>in</strong>, T. S., Bailey, D. V., Fu, K., Juels, A., & O’Hare, T. (2007).<br />

Vulnerabilities <strong>in</strong> first-generation <strong>RFID</strong>-enabled credit cards. In S.<br />

Dietrich & R. Dhamija (Eds.), F<strong>in</strong>ancial Cryptography and Data<br />

Security – Lecture Notes <strong>in</strong> Computer Science, 4886(2007), 2-14.<br />

doi:10.1007/978-3-540-77366-5_2<br />

Hossa<strong>in</strong>, M. M., & Prybutok, V. R. (2008). Consumer acceptance of <strong>RFID</strong><br />

technology: an exploratory study. IEEE Transactions on Eng<strong>in</strong>eer<strong>in</strong>g<br />

Management, 55(2), 316-328. doi:10.1109/TEM.2008.919728<br />

163

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!