23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Microsoft. (2007). SQL Server 2005 Books Onl<strong>in</strong>e. Retrieved from<br />

http://www.microsoft.com/downloads/en/details.aspx?FamilyId=BE6A2<br />

C5D-00DF-4220-B133-29C1E0B6585F&displaylang=en<br />

Mirowski, L., Hartnett, J., & Williams, R. (2009). An <strong>RFID</strong> attacker behavior<br />

taxonomy. Journal of IEEE Pervasive Comput<strong>in</strong>g, 8(4), 79-84.<br />

doi:10.1109/MPRV.2009.68<br />

Mitrokotsa, A., Rieback, M. R., & Tanenbaum, A.S. (2009). Classify<strong>in</strong>g <strong>RFID</strong><br />

attacks and defenses. Special Issue on Advances <strong>in</strong> <strong>RFID</strong> Technology,<br />

Information Systems Frontiers, Spr<strong>in</strong>ger Science and Bus<strong>in</strong>ess Media,<br />

LLC 2009(July). doi:10.1007/s10796-009-9210-z<br />

Mitrokotsa, A., Beye, M., & Peris-Lopez, P. (2010). In D. C. Ranas<strong>in</strong>ghe, Q. Z.<br />

Sheng & S. Zeadally (Eds.), Threats to networked <strong>RFID</strong> systems (pp. 39-<br />

63). Heidelberg, Germany: Spr<strong>in</strong>ger.<br />

Nath, B., Reynolds, F., & Want, R. (2006). <strong>RFID</strong> technology and applications.<br />

Journal of Pervasive Comput<strong>in</strong>g, IEEE Computer Society and<br />

Communications Society, 5(1), 22-24. doi:10.1109/MPRV.2006.13<br />

National Law Enforcement and Corrections Technology Centre - A program of<br />

the National Institute of Justice. (2005, Summer). Technology primer:<br />

radio frequency identification. United States of America: the National<br />

Institute of Justice.<br />

Ngai, E. W. T., Moon, K. K. L., Rigg<strong>in</strong>s, F. J., & Yi, C. Y. (2008). <strong>RFID</strong><br />

research: an academic literature review (1995-2005) and future research<br />

directions. In International Journal of Production Economics, 112(2),<br />

510-520.<br />

Ohkubo, M., Suzuki, K., & K<strong>in</strong>oshita, M. (2005). <strong>RFID</strong> privacy issues and<br />

technical challenges. The Communications of the ACM, 48(9), 66-71.<br />

Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda,<br />

A. (2006). EMAP: An efficient mutual authentication protocol for lowcost<br />

<strong>RFID</strong> tags. In OnTheMove (OTM) Federated Conferences and<br />

Workshop: IS Workshop, Montepellier, France.<br />

Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. M. E., & Ribagorda, A.<br />

(2009). Advances <strong>in</strong> ultra-lightweight cryptography for low-cost <strong>RFID</strong><br />

tags: Gossamer protocol. In K.-I. Chung, K. Sohn, & M. Yung (Eds.),<br />

Workshop on Information Security Application (WISA 2008) – Lecture<br />

167

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!