23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Kou, D., Zhao, K., Tao, Y., & Kou, W. (2006). <strong>RFID</strong> technologies and<br />

applications. In W. Kou & Y. Yesha (Eds.), Enabl<strong>in</strong>g technologies for<br />

wireless e-bus<strong>in</strong>ess (pp. 89-108). The Netherlands: Spr<strong>in</strong>ger.<br />

Landt, J. (2005, December 5). The history of <strong>RFID</strong>. IEEE Potentials Magaz<strong>in</strong>e,<br />

24(4), 8-11. doi:10.1109/MP.2005.1549751<br />

Laurie, A. (2007). Practical attacks aga<strong>in</strong>st <strong>RFID</strong>. Network Security, 2007(9), 4–7.<br />

doi:10.1016/S1353-4858(07)70080-6<br />

Li, X., Xu, G., & Yu, D. (2008). Security architecture for <strong>RFID</strong> application <strong>in</strong><br />

home environment. The 2 nd International Conference on Anti-<br />

counterfeit<strong>in</strong>g, Security and Identification, ASID 2008, 467-470.<br />

Li, H., Yuan, C., Yen, C., Huang, Y., & L<strong>in</strong>, W. (2009). Design and<br />

implementation of <strong>RFID</strong> mutual authentication Protocol. In Proceed<strong>in</strong>gs<br />

of the Third International Conference on Anti-counterfeit<strong>in</strong>g, Security<br />

and Identification <strong>in</strong> Communication, ASID 2009, Hong Kong (pp. 229-<br />

232). United States of America: IEEE Computer Society.<br />

10.1109/ICASID.2009.5276910<br />

Li, T., & Deng, R. H. (2007). Vulnerability analysis of EMAP-An efficient <strong>RFID</strong><br />

mutual authentication protocol. Proceed<strong>in</strong>gs of the Second International<br />

Conference on Availability, Reliability and Security, ARES 2007, Vienna,<br />

Austria (238-245). doi:ieeecomputersociety.org/10.1109/ARES.2007.159<br />

Martone, A. F., & Delp, E. J. (2007). Characterization of RF devices us<strong>in</strong>g twotone<br />

probe signals. IEEE/SP 14 th Workshop on Statistical Signal<br />

Process<strong>in</strong>g, SSP '07, vol., no., pp.161-165, 26-29.<br />

Martone, A. F., Mikkil<strong>in</strong>eni, A. K., & Delp, E. J. (2006). <strong>Forensics</strong> of th<strong>in</strong>gs.<br />

2006 IEEE Southwest Symposium on Image Analysis and Interpretation,<br />

149-152.<br />

Masters, G., & Turner, P. (2007). Forensic data recovery and exam<strong>in</strong>ation of<br />

magnetic swipe card clon<strong>in</strong>g devices. Journal of <strong>Digital</strong> <strong>Investigation</strong>,<br />

4S(2007), S16-S22.<br />

Michael, K., & McCathie, L. (2005). The pros and cons of <strong>RFID</strong> <strong>in</strong> supply cha<strong>in</strong><br />

management. In Proceed<strong>in</strong>gs of the International Conference on Mobile<br />

Bus<strong>in</strong>ess (ICMB’05). USA: IEEE Computer Society.<br />

Middleton, B. (2004). Cyber crime <strong>in</strong>vestigator’s field guide (2nd ed.). United<br />

States of America: Auerbach Publications.<br />

166

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!