正在加载图片...
REFERENCES [26]L.Yang,Y.Li,Q.Lin,X.-Y.Li,and Y.Liu,"Making sense of mechan- ical vibration period with sub-millisecond accuracy using backscatter [1]"Two-Factor Authentication (2FA)Explained:RFID Access signals,"in ACM Mobicom,New York City,New York,October 2016. Control."[Online].Available:https://blog.identityautomation.com/ [27]H.Jin,J.Wang.Z.Yang,S.Kumar,and J.Hong,"Wish:Towards two-factor-authentication-2fa-explained-rfid-access-control a wireless shape-aware world using passive rfids,"in ACM MobiSys. [2]"Duo push."[Online].Available:https://www.duosecurity.com/product/ Munich,Germany,June 2018. methods/duo-mobile [28]Y.Ma,N.Selby,and F.Adib,"Minding the billions:Ultra-wideband localization for deployed rfid tags,"in ACM Mobicom,Snowbird,Utah, [3]Y.Chen,J.Sun,R.Zhang,and Y.Zhang,"Your song your way:Rhythm- October 2017. based two-factor authentication for multi-touch mobile devices."in /EEE INFOCOM,Hong Kong,China.April 2015. [4]B.Hutchins,A.Reddy,W.Jin,M.Zhou,M.Li,and L.Yang,"Beat-pin: A user authentication mechanism for wearable devices through secret beats,"in ACM ASIACCS,Incheon,Republic of Korea,June 2018. [5]"EPC UHF Gen2 Air Interface Protocol."[Onlinel.Available https://www.gs1.org/standards/epc-rfid/uhf-air-interface-protocol [6]"SPEEDWAY R420 RAIN RFID READER."[Online].Available: https://www.impinj.com/platform/connectivity/speedway-r420 [7]"Speedway Revolution Reader Application Note:Low Level User Data Support."[Online].Available:https://support.impinj.com/hc/en-us/ articles/202755318-Application-Note-Low-Level-User-Data-Support [R.Vemulapalli,F.Arrate,and R.Chellappa,"Human action recognition by representing 3d skeletons as points in a lie group,"in IEEE CVPR. Columbus.OH.June 2014. [9]C.Wang.L.Xie,W.Wang.T.Xue.and S.Lu,"Moving tag detection via physical layer analysis for large-scale rfid systems,"in IEEE INFOCOM. San Francisco,CA.April 2016. [10]P.Nikitin and S.Rao,"Antennas and propagation in uhf rfid systems," in IEEE RFID,Las Vegas,NV,April 2008. [11]N.Kargas,F.Mavromatis,and A.Bletsas,"Fully-coherent reader with commodity sdr for gen2 fmo and computational rfid,"IEEE Wireless Communicarions Letters,pp.617-620,2015. [12]L.Kulseng,Z.Yu,Y.Wei,and Y.Guan,"Lightweight mutual authen- tication and ownership transfer for rfid systems,"in IEEE INFOCOM Pisa,Italy,March 2010. [13]T.Li,W.Luo,Z.Mo,and S.Chen,"Privacy-preserving rfid authentica- tion based on cryptographical encoding."in INFOCOM.Orlando.USA, March 2012. [14]L.Yang,Q.Lin,C.Duan,and Z.An,"Analog on-tag hashing:Towards selective reading as hash primitives in gen2 rfid systems,"in ACM Mobicom.Snowbird.Utah.October 2017. [15]H.Hassanieh,J.Wang.D.Katabi,and T.Kohno,"Securing rfids by randomizing the modulation and channel,"in NSD/,Oakland,CA.May 2015. [16]H.Ding.J.Han,Y.Zhang,F.Xiao,W.Xi,G.Wang,and Z.Jiang "Preventing unauthorized access on passive tags,"in IEEE INFOCOM, Honolulu,HI.April 2018. [17]D.Zanetti and B.Danev,"Physical-layer identification of uhf rfid tags," in ACM Mobicom,Chicago,Illinois,September 2010. [18]L.Yang.P.Peng,F.Dang.C.Wang.X.Li,and Y.Liu,"Anti- counterfeiting via federated rfid tags'fingerprints and geometric rela- tionships,"in IEEE INFOCOM,Kowloon,Hong Kong,April 2015. [19]G.Wang,H.Cai,C.Qian,J.Han,X.Li.H.Ding,and J.Zhao,"Towards replay-resilient rfid authentication,"in ACM Mobicom,New Delhi.India. October 2018. [20]C.Zhao.Z.Li,T.Liu,H.Ding.J.Han,W.Xi,and R.Gui,"Rf-mehndi: A fingertip profiled rf identifier,"in IEEE INFOCOM,Paris,France. April 2019. [21]C.Wang,J.Liu,Y.Chen,H.Liu,L.Xie,W.Wang,B.He,and S.Lu,"Multi-touch in the air:Device-free finger tracking and gesture recognition via cots rfid,"in /EEE INFOCOM,Honolulu,HI.April 2018 [22]Y.Bu,L.Xie,Y.Gong,C.Wang.L.Yang,J.Liu,and S.Lu,"Rf-dial an rfid-based 2d human-computer interaction via tag array,"in /EEE INFOCOM,Honolulu,HI,April 2018. [23]C.Wang,J.Liu,Y.Chen,L.Xie,H.Liu,and S.Lu,"Rf-kinect:A wearable rfid-based approach towards 3d body movement tracking."in ACM UBICOMP,Singapore,October 2018. [24]H.Jin,Z.Yang,S.Kumar,and J.Hong."Towards wearable everyday body-frame tracking using passive rfids,"in ACM UB/COMP,Singapore October 2018. [25]T.Wei and X.Zhang,"Gyro in the air:tracking 3d orientation of batteryless intemet-of-things,"in ACM Mobicom,New York City,New York.October 2016.REFERENCES [1] “Two-Factor Authentication (2FA) Explained: RFID Access Control.” [Online]. Available: https://blog.identityautomation.com/ two-factor-authentication-2fa-explained-rfid-access-control [2] “Duo push.” [Online]. Available: https://www.duosecurity.com/product/ methods/duo-mobile [3] Y. Chen, J. Sun, R. Zhang, and Y. Zhang, “Your song your way: Rhythm￾based two-factor authentication for multi-touch mobile devices,” in IEEE INFOCOM, Hong Kong, China, April 2015. [4] B. Hutchins, A. Reddy, W. Jin, M. Zhou, M. Li, and L. Yang, “Beat-pin: A user authentication mechanism for wearable devices through secret beats,” in ACM ASIACCS, Incheon, Republic of Korea, June 2018. [5] “EPC UHF Gen2 Air Interface Protocol.” [Online]. Available: https://www.gs1.org/standards/epc-rfid/uhf-air-interface-protocol [6] “SPEEDWAY R420 RAIN RFID READER.” [Online]. Available: https://www.impinj.com/platform/connectivity/speedway-r420 [7] “Speedway Revolution Reader Application Note: Low Level User Data Support.” [Online]. Available: https://support.impinj.com/hc/en-us/ articles/202755318-Application-Note-Low-Level-User-Data-Support [8] R. Vemulapalli, F. Arrate, and R. Chellappa, “Human action recognition by representing 3d skeletons as points in a lie group,” in IEEE CVPR, Columbus, OH, June 2014. [9] C. Wang, L. Xie, W. Wang, T. Xue, and S. Lu, “Moving tag detection via physical layer analysis for large-scale rfid systems,” in IEEE INFOCOM, San Francisco, CA, April 2016. [10] P. Nikitin and S. Rao, “Antennas and propagation in uhf rfid systems,” in IEEE RFID, Las Vegas, NV, April 2008. [11] N. Kargas, F. Mavromatis, and A. Bletsas, “Fully-coherent reader with commodity sdr for gen2 fm0 and computational rfid,” IEEE Wireless Communications Letters, pp. 617–620, 2015. [12] L. Kulseng, Z. Yu, Y. Wei, and Y. Guan, “Lightweight mutual authen￾tication and ownership transfer for rfid systems,” in IEEE INFOCOM, Pisa, Italy, March 2010. [13] T. Li, W. Luo, Z. Mo, and S. Chen, “Privacy-preserving rfid authentica￾tion based on cryptographical encoding,” in INFOCOM, Orlando, USA, March 2012. [14] L. Yang, Q. Lin, C. Duan, and Z. An, “Analog on-tag hashing: Towards selective reading as hash primitives in gen2 rfid systems,” in ACM Mobicom, Snowbird, Utah, October 2017. [15] H. Hassanieh, J. Wang, D. Katabi, and T. Kohno, “Securing rfids by randomizing the modulation and channel,” in NSDI, Oakland, CA, May 2015. [16] H. Ding, J. Han, Y. Zhang, F. Xiao, W. Xi, G. Wang, and Z. Jiang, “Preventing unauthorized access on passive tags,” in IEEE INFOCOM, Honolulu, HI, April 2018. [17] D. Zanetti and B. Danev, “Physical-layer identification of uhf rfid tags,” in ACM Mobicom, Chicago, Illinois, September 2010. [18] L. Yang, P. Peng, F. Dang, C. Wang, X. Li, and Y. Liu, “Anti￾counterfeiting via federated rfid tags’ fingerprints and geometric rela￾tionships,” in IEEE INFOCOM, Kowloon, Hong Kong, April 2015. [19] G. Wang, H. Cai, C. Qian, J. Han, X. Li, H. Ding, and J. Zhao, “Towards replay-resilient rfid authentication,” in ACM Mobicom, New Delhi, India, October 2018. [20] C. Zhao, Z. Li, T. Liu, H. Ding, J. Han, W. Xi, and R. Gui, “Rf-mehndi: A fingertip profiled rf identifier,” in IEEE INFOCOM, Paris, France, April 2019. [21] C. Wang, J. Liu, Y. Chen, H. Liu, L. Xie, W. Wang, B. He, and S. Lu, “Multi-touch in the air: Device-free finger tracking and gesture recognition via cots rfid,” in IEEE INFOCOM, Honolulu, HI, April 2018. [22] Y. Bu, L. Xie, Y. Gong, C. Wang, L. Yang, J. Liu, and S. Lu, “Rf-dial: an rfid-based 2d human-computer interaction via tag array,” in IEEE INFOCOM, Honolulu, HI, April 2018. [23] C. Wang, J. Liu, Y. Chen, L. Xie, H. Liu, and S. Lu, “Rf-kinect: A wearable rfid-based approach towards 3d body movement tracking,” in ACM UBICOMP, Singapore, October 2018. [24] H. Jin, Z. Yang, S. Kumar, and J. Hong, “Towards wearable everyday body-frame tracking using passive rfids,” in ACM UBICOMP, Singapore, October 2018. [25] T. Wei and X. Zhang, “Gyro in the air: tracking 3d orientation of batteryless internet-of-things,” in ACM Mobicom, New York City, New York, October 2016. [26] L. Yang, Y. Li, Q. Lin, X.-Y. Li, and Y. Liu, “Making sense of mechan￾ical vibration period with sub-millisecond accuracy using backscatter signals,” in ACM Mobicom, New York City, New York, October 2016. [27] H. Jin, J. Wang, Z. Yang, S. Kumar, and J. Hong, “Wish: Towards a wireless shape-aware world using passive rfids,” in ACM MobiSys, Munich, Germany, June 2018. [28] Y. Ma, N. Selby, and F. Adib, “Minding the billions: Ultra-wideband localization for deployed rfid tags,” in ACM Mobicom, Snowbird, Utah, October 2017
<<向上翻页
©2008-现在 cucdc.com 高等教育资讯网 版权所有