23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Juels, A., & Weis, S. (2005). Authenticat<strong>in</strong>g pervasive devices with human<br />

protocols. In V. Shoup (Ed.), Advances <strong>in</strong> Cryptology (CRYPTO 2005) –<br />

Lecture Notes <strong>in</strong> Computer Science, 3126(2005), 293-308.<br />

doi:10.1007/11535218_18<br />

Juels, A. (2006). <strong>RFID</strong> security and privacy: a research survey. IEEE Journal on<br />

Selected Areas <strong>in</strong> Communications, 24(2), 381-394.<br />

doi:10.1109/JSAC.2005.861395<br />

Kamoun, F. (2009). <strong>RFID</strong> system management: State-of-the art and open research<br />

issues. Journal of IEEE Transactions on Network and Service<br />

Management, 6(3), 190-205. doi: 10.1109/TNSM.2009.03.090305<br />

Karygiannis, A., Phillips, T., & Tsibertzopoulos, A. (2006). <strong>RFID</strong> security: a<br />

taxonomy of risk. In Proceed<strong>in</strong>gs of the First International Conference<br />

on Communications and Network<strong>in</strong>g (Ch<strong>in</strong>aCom ’06), Ch<strong>in</strong>a (pp. 1-8).<br />

doi:10.1109/CHINACOM.2006.344722<br />

Karygiannis, T., Eydt, B., Barber, G., Bunn, L., & Phillips, T. (2007). Guidel<strong>in</strong>es<br />

for secur<strong>in</strong>g radio frequency identification (<strong>RFID</strong>) systems, Special<br />

Publication 800-98, National Institute of Standards and Technology,<br />

April. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-<br />

98/SP800-98_<strong>RFID</strong>-2007.pdf<br />

Khannaa, N., Mikkil<strong>in</strong>enia, A. K., Martonea, A. F., Alia, G. N., Chiub, G. T.,<br />

Allebacha, J. P., & Delpa, E. J. (2006). A survey of forensic<br />

characterization methods for physical devices. <strong>Digital</strong> <strong>Investigation</strong>,<br />

3S(2006), S17-S28.<br />

Kim, D. S., Sh<strong>in</strong>, T., & Park, J. S. (2007). A security framework <strong>in</strong> <strong>RFID</strong> multidoma<strong>in</strong><br />

system. The Second International Conference on Availability,<br />

Reliability and Security, ARES 2007, vol., no., pp.1227-1234, 10-13<br />

April 2007.<br />

Knospe, H., & Pohl, H. (2004). <strong>RFID</strong> security. Information Security Technical<br />

Report, 9(4), 39-50. doi:10.1016/S1363-4127(05)70039-X<br />

Konidala, D. M., Kim, Z., & Kim, K. (2007). A simple and cost-effective <strong>RFID</strong><br />

tag-reader mutual authentication scheme. In Proceed<strong>in</strong>gs of International<br />

Conference on <strong>RFID</strong> Security 2007 (<strong>RFID</strong>Sec07), Malaga, Spa<strong>in</strong> (141-<br />

152).<br />

165

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!