23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Samani, R. (2010). Re-def<strong>in</strong><strong>in</strong>g the human factor. Journal of Infosecurity, 7(2),<br />

30-33. doi:10.1016/S1754-4548(10)70039-5<br />

Sanghera, P., Thornton, F., Ha<strong>in</strong>es, B., Kle<strong>in</strong>schmidt, J., Das, A. M., Bhargava,<br />

H., & Campbell, A. (2007). How to cheat at deploy<strong>in</strong>g and secur<strong>in</strong>g<br />

<strong>RFID</strong>. Burl<strong>in</strong>gton, Massachusetts, United States of America: Syngress<br />

Publish<strong>in</strong>g, Inc.<br />

Sangwan, R. S., Qiu, R. G., & Jessen, D. (2005). Us<strong>in</strong>g <strong>RFID</strong> tags for track<strong>in</strong>g<br />

patients, charts and medical equipment with<strong>in</strong> an <strong>in</strong>tegrated health<br />

delivery network. In Proceed<strong>in</strong>gs of Network<strong>in</strong>g, Sens<strong>in</strong>g and Control,<br />

2005 IEEE, vol., no., pp. 1070-1074, 19-22 March 2005.<br />

Sheng, Q. Z., Li, X., & Zeadally, S. (2008). Enabl<strong>in</strong>g next-generation <strong>RFID</strong><br />

applications: solutions and challenges. Journal of Computer, IEEE<br />

Computer Society, 41(9), 21-28. doi:10.1109/MC.2008.386<br />

Shih, D., L<strong>in</strong>, C., & L<strong>in</strong>, B. (2005). <strong>RFID</strong> tags: privacy and security aspects.<br />

International Journal of Mobile Communications, 3(3), 214-230.<br />

Simon, M., & Slay, J. (2009). Enhancement of forensic comput<strong>in</strong>g <strong>in</strong>vestigations<br />

through memory forensic techniques. In Proceed<strong>in</strong>gs of 2009<br />

International Conference on Availability, Reliability and Security,<br />

ARES(2009), 995-1000. Los Alamitos, California, United States of<br />

America: IEEE Computer Society. doi:10.1109/ARES.2009.119<br />

Solanas, A., Dom<strong>in</strong>go-Ferrer, J., Martı´nez-Balleste´, A., & Daza, V. (2007). A<br />

distributed architecture for scalable private <strong>RFID</strong> tag identification.<br />

Journal of Computer Networks, 51(2007), 2268-2279.<br />

Thevissen, P. W., Poelman, G., Cooman, M. D., Puers, R., & Willems, G. (2006).<br />

Implantation of an <strong>RFID</strong>-tag <strong>in</strong>to human molars to reduce hard forensic<br />

identification labor. Part I: Work<strong>in</strong>g pr<strong>in</strong>ciple. Journal of Forensic<br />

Science International, 159S (2006), 159(Supplement 1), S33-S39.<br />

Thevissen, P. W., G. Poelman, Cooman, M. D., Puers, R., & Willems, G. (2006).<br />

Implantation of an <strong>RFID</strong>-tag <strong>in</strong>to human molars to reduce hard forensic<br />

identification labor. Part 2: Physical properties. Journal of Forensic<br />

Science International, 159(Supplement 1), S40-S46.<br />

Thornton, F., Ha<strong>in</strong>es, B., Das, A. M., Bhargava, H., Campbell, A., &<br />

Kle<strong>in</strong>schmidt, J. (2006). <strong>RFID</strong> Security. Canada: Syngress Publish<strong>in</strong>g,<br />

Inc.<br />

169

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!