Danev et al., 2012
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Danev et al. | On physical-layer identification of wireless devices | |
| Wang et al. | Towards replay-resilient RFID authentication | |
| Periaswamy et al. | Fingerprinting RFID tags | |
| Danev et al. | Attacks on physical-layer identification | |
| Reising et al. | Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints | |
| Yang et al. | Protecting endpoint devices in IoT supply chain | |
| Han et al. | Butterfly: Environment-independent physical-layer authentication for passive RFID | |
| Khor et al. | Security problems in an RFID system | |
| Chen et al. | An ownership transfer scheme using mobile RFIDs | |
| CN106446743B (en) | Detection method for illegal tampering of ultrahigh frequency RFID (radio frequency identification) label based on physical layer | |
| Ding et al. | Preventing unauthorized access on passive tags | |
| Zhang et al. | Tag-based PHY-layer authentication for RIS-assisted communication systems | |
| Li et al. | RCID: Fingerprinting passive RFID tags via wideband backscatter | |
| Chen et al. | Combating tag cloning with COTS RFID devices | |
| Andrews | Extensions to radio frequency fingerprinting | |
| Zanetti et al. | Types and origins of fingerprints | |
| Yang et al. | Physical layer authentication in backscatter communication: a review | |
| Zhao et al. | Backdoor attacks against low-earth orbit satellite fingerprinting | |
| Huang et al. | RFID systems integrated OTP security authentication design | |
| Kim et al. | MARP: Mobile agent for RFID privacy protection | |
| Ranasinghe et al. | Confronting security and privacy threats in modern RFID systems | |
| Jain et al. | Analysis of vulnerabilities in radio frequency identification (RFID) systems | |
| Yang | Lightweight authentication protocol for mobile RFID networks | |
| Morshed et al. | Efficient mutual authentication protocol for radiofrequency identification systems | |
| Yang et al. | ReSC: RFID-enabled supply chain management and traceability for network devices |