23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Workman, M. (2008). Ga<strong>in</strong><strong>in</strong>g access with social eng<strong>in</strong>eer<strong>in</strong>g: an empirical study<br />

of the threat. Journal of Information Systems Security, 16(2008), 315-<br />

331.<br />

Xiao, Y., Yu, S., Wu, K., Ni, Q., Janecek, C., & Nordstad, J. (2007). Radio<br />

frequency identification: technologies, applications, and research issues.<br />

Journal of Wireless Communications and Mobile Comput<strong>in</strong>g 7(4): 457-<br />

472.<br />

Zhang, M., Li, W., Wang, Z., Li, B., & Xia, R. (2007). A <strong>RFID</strong>-based material<br />

track<strong>in</strong>g <strong>in</strong>formation system. Paper presented at the 2007 IEEE<br />

International Conference on Automation and Logistics, vol., no.,<br />

pp.2922-2926, 18-21 Aug. 2007.<br />

Zhang, Y., & L<strong>in</strong>, Y. (2010, April 2-4). Research on the key technology of secure<br />

computer forensics. Paper presented at The 2010 International<br />

Symposium on Intelligent Information Technology and Security<br />

Informatics (IITSI), J<strong>in</strong>ggangshan, Ch<strong>in</strong>a. Retrieved from<br />

http://ieeeexplore.ieee.org<br />

Zhou, Z., & Huang, D. (2008). SRK: A distributed <strong>RFID</strong> data access control<br />

mechanism. Paper presented at the IEEE International Conference on<br />

Communications, ICC '08, vol., no., pp.2854-2858, 19-23 May 2008.<br />

171

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!