You are here: Resources > FIDIS Deliverables > HighTechID > D3.7: A Structured Collection on RFID Literature > 

D3.7 A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification (RFID)

References  Untitled
BIBLIOGRAPHY
 Abbreviations and Glossary

 

Bibliography

 

A collection on current articles dealing with security and privacy aspects of RFID is given in this chapter. It also is available in the FIDIS Online Bibliographic System via http://www.fidis.net/interactive/rfid-bibliography/. 

 

[AF05]     Manfred Aigner and Martin Feldhofer. Secure symmetric authentication for rfid tags. In Telecommunication and Mobile Computing – TCMC 2005, Graz, Austria, March 2005.

[AO05a]     Gildas Avoine and Philippe Oechslin. RFID Traceability: A multilayer problem. In Financial Cryptography – FC’05, in Lecture Notes in Computer Science, pages 125-140, Springer-Verlag, Berlin Germany, 2005.

[AO05b]     Gildas Avoine and Philippe Oechslin. A scalable and provably secure hash based RFID protocol. In The 2nd IEEE International Workshop on Pervasive Computing and Communication Security – PerSec 2005 (To appear), Kauai Island, Hawaii, USA, March 2005. IEEE, IEEE Computer Society Press.

[ART05]     ARTICLE 29 Data Protection Working Party. Working document on data protection issues related to RFID technology. EU 10107/05/EN WP 105, January 2005.     
europa.eu.int/comm/internal_market/privacy/docs/wpdocs/2005/wp105_en.pdf.

[Avo05]     Gildas Avoine. Adversarial model for radio frequency identification. Cryptology ePrint Archive, Report 2005/049, 2005. http://eprint.iacr.org/.

[Boo04]     Book Industry Study Group. BISG Policy Statement. www.bisg.org/docs/BISG_Policy_002.pdf, September 2004.

[Bri04]     Jerry Brito. Relax, don’t do it: Why RFID privacy concerns are exaggerated and legislation is premature. UCLA Journal of Law and Technology, 8(2), Fall 2004. www.lawtechjournal.com/articles/2004/05_041220_brito.pdf.

[Cav04]     Ann Cavoukian. Tag, you’re it: Privacy implications of radio frequency identification (RFID) technology. www.ipc.on.ca/scripts/index_.asp?action=31&P_ID=15007, February 2004.

[CM03]     Vinod Chachra and Daniel McPherson. Personal privacy and use of RFID technology in libraries. White Paper, VTLS Inc., www.vtls.com/documents/privacy.pdf, October 2003.

[CW00]     A. Cerino and W.P. Walsh. Research and application of radio frequency identification (RFID) technology to enhance aviation security. In National Aerospace and Electronics Conference NAECON 2000, pages 127–135, 2000.

[EHD04]     Stephan Engberg, Morten Harning, and Christian Damsgaard Jensen. Zero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience. In The Second Annual Conference on Privacy, Security and Trust – PST, New Brunswick, Canada, October 2004.

[FDW04]     Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In Marc Joye and Jean-Jacques Quisquater, editors, 6th International Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, number 3156 in Lecture Notes in Computer Science, pages 357–370. Springer-Verlag, Berlin Germany, 2004.

[FJJ02] Jeu de paume: A security suite for handheld devices. Manuscript, 2002.

[FJPR04]     Kenneth P. Fishkin, Bing Jiang, Matthai Philipose, and Sumit Roy. I sense a disturbance in the force: Unobtrusive detection of interactions with rfid-tagged objects. In Nigel Davies, Elizabeth Mynatt, and Itiro Siio, editors, 6th International Conference on Ubiquitous Computing (UbiComp 2004), number 3205 in Lecture Notes in Computer Science, pages 268–282. Springer-Verlag, Berlin Germany, 2004.

[FL04]     Christian Floerkemeier and Matthias Lampe. Issues with RFID usage in ubiquitous computing applications. In Pervasive Computing, volume 3001 of Lecture Notes in Computer Science, pages 188–193. Springer-Verlag, Berlin Germany, 2004.

[FRJ04] Some methods for privacy in RFID communication. In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), number 3313 in Lecture Notes in Computer Science, pages 42–53. Springer-Verlag, Berlin Germany, 2004. Also published as IRS-TR-04-010, Jun. 1, 2004.

[FSL04] Scanning with a purpose – supporting the fair information principles in RFID protocols. In Lecture Notes in Computer Science 35898 (2005), pages 214-231. Springer-Verlag, Berlin Germany 2005.

[FT05]     Christian Floerkemeier and Frederic Thiesse. EPC technology. In D. Hutter and M. Ullmann, editors, Second International Conference on Security in Pervasive Computing (SPC 2005), number 3450 in Lecture Notes in Computer Science, pages 117–118. Springer-Verlag, Berlin Germany, 2005.

[Fus04]     Roberta A. Fusaro. None of our business? Harvard Business Review, 82(12), pages 33–38, December 2004.

[Gar02]     Simson Garfinkel. An RFID bill of rights. MIT Technology Review, page 35, October 2002.

[GHM+04]     Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Laura Quilter, Jennifer Urban, and David Wagner. Radio frequency identification and privacy with information goods. In Workshop on Privacy in the Electronic Society – WPES (To appear), Lecture Notes in Computer Science, Washington, DC, USA, October 2004. Springer-Verlag.

[GJJS04] Universal re-encryption for mixnets. In T. Okamoto, editor, RSA Conference Cryptographers’ Track ’04, 2004.

[GKS04]     Gunnar Gaubatz, Jens-Peter Kaps, and Berk Sunar. Public key cryptography in sensor networks – revisited. In Claude Castelluccia, Hannes Hartenstein, and Christof Paar et al., editors, First European Workshop on Security in Ad-hoc and Sensor Networks (ESAS 2004), number 3313 in Lecture Notes in Computer Science, pages 2–18. Springer-Verlag, Berlin Germany, 2004.

[GL04]     Marc Girault and David Lefranc. Public key authentication with one (online) single addition. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems (CHES 2004), number 3156 in Lecture Notes in Computer Science, pages 413–427. Springer-Verlag, Berlin Germany, 2004.

[GXW+04]     Xingxin (Grace) Gao, Zhe (Alex) Xiang, Hao Wang, Jun Shen, Jian Huang, and Song Song. An approach to security and privacy of RFID system for supply chain. In IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East’04), pages 164–168. IEEE Computer Society, 2004.

[Hjo04]     Thomas Hjorth. Supporting privacy in RFID systems (master thesis), December 2004.

[HM04]     Dirk Henrici and Paul M¨uller. Tackling security and privacy issues in radio frequency identification devices. In Pervasive Computing, volume 3001 of Lecture Notes in Computer Science, pages 219–224. Springer-Verlag, Berlin Germany, 2004.

[JB04]     Ari Juels and John Brainard. Soft blocking: Flexible blocker tags on the cheap. In ACM Workshop on Privacy in the Electronic Society (WPES), pages 1–7. ACM Press, 2004.

[JLR00]     S. Janson, T. Luczak, and A. Rucinski. Random Graphs. Wiley-Interscience Series of Discrete Mathematics and Optimization. Wiley, 2000.

[JMW05]     Ari Juels, David Molnar, and David Wagner. Security and privacy issues in e-passports. Cryptology ePrint Archive, Report 2005/095, http://eprint.iacr.org/, 2005.

[JP03]     A. Juels and R. Pappu. Squealing Euros: Privacy protection in RFID-enabled banknotes. In R. Wright, editor, Financial Cryptography, number 2742 in Lecture Notes in Computer Science, pages 103–121. Springer-Verlag, Berlin Germany, 2003.

[JRS03]     Ari Juels, Ronald L. Rivest, and Michael Szydlo. The blocker tag: selective blocking of RFID tags for consumer privacy. In 10th ACM Conference on Computer and Communication Security, pages 103–111. ACM Press, 2003.

[Jue04a]     A. Juels. “Yoking-Proofs” for RFID Tags. In R. Sandhu and R. Thomas, editors, Workshop on Pervasive Computing and Communications Security (PerSec’04), pages 138–143. IEEE Press, 2004.

[Jue04b]     Ari Juels. Minimalist cryptography for low-cost RFID tags (extended abstract). In C. Blundo and S. Cimato, editors, The Fourth International Conference on Security in Communication Networks – SCN 2004, number 3352 in Lecture Notes in Computer Science, pages 149–164. Springer-Verlag, Berlin Germany, 2004.

[Jue04c]     Ari Juels. Strengthening EPC tags against cloning. Manuscript, October 2004.

[KOH+05]     Shingo Kinoshita, Miyako Ohkubo, Fumitaka Hoshino, Gembu Morohashi, Osamu Shionoiri, and Atsushi Kanai. Privacy enhanced active rfid tag. In International Workshop on Exploiting Context Histories in Smart Environments – ECHISE’05, Munich, Germany, May 2005.

[KP04]    Heiko Knospe and Hartmut Pohl. RFID security. Information Security Technical Report, 9(4), pages 9–50, November–December 2004.

[Loe03]     Larry Loeb. RFID: Menace to society or just plain dumb? — what’s really wrong with radio frequency identification tags. IBM DeveloperWorks http://www-106.ibm.com/ developerworks/wireless/library/wi-roam16.html, November 2003.

[Luc04]     D. Luckett. The supply chain. BT Technology Journal, 22(3), pages 50–55, July 2004.

[McA03]     Alastair McArthur. Integrating RFID into library systems – myths and realities. In World Library and Information Congress: 69th IFLA General Conference and Council, 2003.

[McG04]     Meg McGinity. RFID: Is this game of tag fair play? Communications of the ACM, 47(1), pages 15–18, 2004.

[MT04]     Eiji Murakami and Takao Terano. Fairy Wing: Distributed Information Service with RFID Tags. In Computer Helping People with Special Needs (ICCHP 2004), number 3012 in Lecture Notes in Computer Science, pages 174–189. Springer-Verlag, Berlin Germany, 2004.

[MW04] Privacy and Security in Library RFID: Issues, Practices, and Architectures. In 11th ACM Conference on Computer and Communications Security (CCS), pages 210–219. ACM Press, 2004.

[Oll95]     M.M. Ollivier. RFID – a new solution technology for security problems. European Convention on Security and Detection, May 1995.

[OSK03]     Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita. A cryptographic approach to “privacy-friendly” tags. RFID Privacy Workshop, 2003.

[REC04a]     Damith Ranasinghe, Daniel Engels, and Peter Cole. Low-cost RFID systems: Confronting security and privacy. Auto-ID Labs Research Workshop, Zurich, Switzerland, September 2004.

[REC04b]     Damith Ranasinghe, Daniel Engels, and Peter Cole. Security and privacy: Modest proposals for low-cost RFID systems. Auto-ID Labs Research Workshop, Zurich, Switzerland, September 2004.

[RKK05]     Challenge-response based rfid authentication protocol for distributed database environment. In Security in Pervasive Computing, number 3450 in Lecture Notes in Computer Science, pages 70–84, 2005.

[SB04]     A. Soppera and T. Burbridge. Maintaining privacy in pervasive computing – enabling acceptance of sensor-based services. BT Technology Journal, 22(3), pages 106–118, July 2004.

[SBE01]     Sanjay E. Sarma, D. Brook, and Daniel W. Engels. Radio frequency identification and the electronic product code. Micro, 21(6), pages 50–54, 2001.

[Sch03]     Esther Schindler. Location, location, location. ACM netWorker, 7(2), pages 11–14, 2003.

[SF03]     Frank Siegemund and Christan Flörkemeier. Interaction in pervasive computing settings using bluetooth-enabled active tags and passive rfid technology together with mobile phones. In IEEE International Conference on Pervasive Computing and Communications (PerCom 2003), pages 378-387, 2003.

[SRS04] J    unichiro Saito, Jae-Cheol Ryou, and Kouichi Sakura. Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. In Laurence T. Yang, Minyi Guo, and et al. Guang R. Gao, editors, Embedded and Ubiquitous Computing (EUC 2004), number 3207 in Lecture Notes in Computer Science, pages 879–890. Springer-Verlag, Berlin Germany, 2004.

[SS05]     Junichiro Saito and Kouichi Sakurai. Grouping proof for RFID Tags. In 19th International Conference on Advanced Information Networking and Applications (AINA’05), volume 2, pages 621–624. IEEE Press, 2005.

[SWE02]     Sanjay E. Sarma, Stephen A. Weis, and Daniel W. Engels. RFID systems and security and privacy implications. In B.S. Kaliski Jr, C.K. Koc , and C. Paar, editors, 4th International Workshop on Cryptographic Hardware and Embedded System (CHES 2002), number 2523 in Lecture Notes in Computer Science, pages 454–469. Springer-Verlag, Berlin Germany, 2002.

[SWE03] Radio-frequency identification: Risks and challenges. RSA CryptoBytes, 6(1), pages 2–9, 2003.

[TUI+01]     K. Takaragi, M. Usami, R. Imura, R. Itsuki, and T. Satoh. An ultra small individual recognition security chip. Micro, 21(6), pages 43–49, Nov/Dec 2001.

[VB03]     I. Vajda and L. Buttyán. Lightweight authentication protocols for low-cost RFID tags. In 2nd Workshop on Security in Ubiquitous Computing, pages ?–?, 2003. In conjunction with Ubicomp 2003.

[Wan04]     Roy Want. RFID: A key to automating everything. Scientific American, pages 46–55, January 2004.

[Wei03]     Aaron Weiss. Me and my shadow. ACM netWorker, 7(3):24–30, 2003.

[WSRE03]     S.A. Weis, S. Sarma, R. Rivest, and D. Engels. Security and privacy aspects of low-cost radio frequency identification systems. In First International Conference on Security in Pervasive Computing, number 2802 in Lecture Notes in Computer Science, pages 201–212. Springer-Verlag, Berlin Germany, 2003.

 

 

 

 

References  fidis-wp3-del3.7.Structured_Collection_RFID_02.sxw  Abbreviations and Glossary
Denis Royer 42 / 46