射频识别(RFID)隐私保护技术综述
作者:
基金项目:

国家自然科学基金(60973119, 61170041)


Survey of Privacy of Radio Frequency Identification Technology
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [25]
  • |
  • 相似文献
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    随着RFID(radio frequency identification)技术的广泛应用,引发的隐私威胁问题越来越突出.了解RFID隐私的内涵和常见攻击方法,掌握现有的RFID隐私保护技术,有助于减少RFID隐私信息的泄漏.从RFID技术的基本概念入手,全面分析了RFID隐私及隐私威胁,给出了RFID隐私分类方法;对RFID隐私中的跟踪攻击和罗列攻击两种攻击方法进行了深入探讨.在此基础上,对现有典型的RFID隐私防御方法进行了详细讨论.全面介绍了RFID隐私保护技术发展现状和动态,可作为开展RFID隐私保护技术研究工作的参考和借鉴.

    Abstract:

    This survey investigates different approaches proposed in the literature for addressing the privacy issues derived from the radio-frequency identification (RFID) and RFID based applications. The concep of RFID privacy and the vulnerability of privacy in RFID are both discussed. A detail discussion about the classification of RFID privacy is provided. Typical RFID privacy attacks, tracking attack and inventorying attack are also addressed. Finally, concentrating on the existing solutions for RFID privacy, and elaborates how the privacy in RFID and RFID based applications can be assured. The main goal of this survey is to give a concise classification of the most relevant privacy protection solutions applied to RFID privacy. For purpose of brevity and clarity, only the most relevant approaches are selected and addressed.

    参考文献
    [1] Grover A, Berghel H. A survey of RFID deployment and security issues. Journal of Information Processing Systems, 2001,7(4): 561-580.
    [2] Rieback MR, Crispo B, Tanenbaum AS. The evolution of RFID security. IEEE Pervasive Computing, 2006,5(1):62-69.[doi: 10. 1109/MPRV.2006.17]
    [3] Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication, 2006,24(2):381-394.[doi: 10.1109/JSAC.2005.861395]
    [4] Langheinrich M. A survey of RFID privacy approaches. Personal and Ubiquitous Computing, 2009,13(6):413-421.[doi: 10.1007/s00779-008-0213-4]
    [5] Garcia-Alfaro J, Barbeau M, Kranakis E. Security threat mitigation trends in low-cost RFID systems. Lecture Notes in Computer Science, 2010,5939:193-207.[doi: 10.1007/978-3-642-11207-2_15]
    [6] Hermans J, Peeters R, Preneel B. Proper RFID privacy: Model and protocols. IEEE Trans. on Mobile Computing, 2014,13(12): 2888-2902.[doi: 10.1109/TMC.2014.2314127]
    [7] Klitou D. Human-Implantable microchips: Location-Awareness and the dawn of an “Internet of Persons”. Information Technology and Law Series, 2014,25:157-249.[doi: 10.1007/978-94-6265-026-8_7]
    [8] Karjoth G, Moskowitz PA. Disabling RFID tags with visible confirmation: Clipped tags are silenced. In: Proc. of the 2005 ACM Workshop on Privacy in the Electronic Society. New York: ACM Press, 2005. 27-30. http://doi.acm.org/10.1145/1102199.1102205[doi: 10.1145/1102199.1102205]
    [9] Vahedi E, Shah-Mansouri V, Wong VWS, Blake IF, Ward RK. Probabilistic analysis of blocking attack in RFID systems. IEEE Trans. on Information Forensics and Security, 2011,6(3):803-817.[doi: 10.1109/TIFS.2011.2132129]
    [10] Mitrokotsa A, Rieback MR, Tanenbaum AS. Classifying RFID attacks and defenses. Information Systems Frontiers, 2010,12(5): 491-505.[doi: 10.1007/s10796-009-9210-z]
    [11] Danev B, Heydt-Benjamin TS, Čapkun S. Physical-Layer identification of RFID devices. In: Proc. of the 18th Conf. on USENIX Security Symp. Berkeley: USENIX Association, 2009. 199-214. https://www.usenix.org/legacy/events/sec09/tech/full_papers/danev.pdf
    [12] Zanetti D, Sachs P, Capkun S. On the practicality of UHF RFID fingerprinting: How real is the RFID tracking problem? Lecture Notes in Computer Science, 2011,6794:97-116.[doi: 10.1007/978-3-642-22263-4_6]
    [13] Danev B, Capkun S, Masti RJ, Benjamin TS. Towards practical identification of HF RFID devices. ACM Trans. on Information and System Security, 2012,15(2):1-24.[doi: 10.1145/2240276.2240278]
    [14] Zanetti D, Danev B, Capkun S. Physical-Layer identification of UHF RFID tags. In: Proc. of the 16th Annual Int'l Conf. on Mobile Computing and Networking. New York: ACM Press, 2010. 353-364. http://doi.acm.org/10.1145/1859995.1860035[doi: 10.1145/1859995.1860035]
    [15] Inoue S, Yasuura H. RFID privacy using user-controllable uniqueness. In: Proc. of the RFID Privacy Workshop. MIT, 2003. 1-7.
    [16] van Deursen T, Radomirović S. Insider attacks and privacy of RFID protocols. Lecture Notes in Computer Science, 2012,7163: 91-105.[doi: 10.1007/978-3-642-29804-2_6]
    [17] Kurkovsky S, Syta E, Casano B. Continuous RFID-enabled authentication: Privacy implications. IEEE Technology and Society Magazine, 2011,30(3):34-41.[doi: 10.1109/MTS.2011.942306]
    [18] Good N, Han J, Miles E, Molnar D, Mulligan D, Quilter L, Urban J, Wagner D. Radio frequency identification and privacy with information goods. In: di Vimercati SDC, Syverson P, eds. Proc. of the Workshop on Privacy in the Electronic Society. 2004. 41-42.[doi: 10.1145/1029179.1029193]
    [19] Juels A. Minimalist cryptography for low-cost RFID tags. Lecture Notes in Computer Science, 2005,3352:149-164.[doi: 10.1007/978-3-540-30598-9_11]
    [20] Langheinrich M, Marti R. Practical minimalist cryptography for RFID privacy. IEEE Systems Journal, 2007,1(2):115-128.[doi: 10. 1109/JSYST.2007.907683]
    [21] Fabian B, Ermakova T, Muller C. SHARDIS: A privacy-enhanced discovery service for RFID-based product information. IEEE Trans. on Industrial Informatics, 2012,8(3):707-718.[doi: 10.1109/TII.2011.2166783]
    [22] Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm. Lecture Notes in Computer Science, 2004,3156:357-370.[doi: 10.1007/978-3-540-28632-5_26]
    [23] Hoepman JH, Joosten R. Practical schemes for privacy and security enhanced RFID. Lecture Notes in Computer Science, 2010, 6033:138-153.[doi: 10.1007/978-3-642-12368-9_10]
    [24] Fishkin KP, Roy S, Jiang B. Some methods for privacy in RFID communication. Lecture Notes in Computer Science, 2005,3313: 42-53.[doi: 10.1007/978-3-540-30496-8_5]
    [25] Lim CH, Korkishko T. mCrypton—A lightweight block cipher for security of low-cost RFID tags and sensors. Lecture Notes in Comp????戠慓瑣瑩敥牮祣?瀬漠眲攰爰收搬″洷漸戶椺氲攴″搭攲瘵椸挮敛?景潩爺?刱???‰瀰爷椯瘱愱挶礰?洹愳游慟朱改浝攼湢瑲???渶??偁牶潯捩??漠晇?琠桐敲??畡獣瑹爠慩汳慳獵楥慳渠??漠湒晆??漠湢??湫普潯牴浥愠瑰楲潯湴?卣整捩畯牮椠瑳祣?慥湭摥?倮爠楉癮愺挠祐???敤物汮楡湳???攠楄摥敳汷扡敲牴来??匬瀠牋楡湤条敭爠?噁故爬氠慥杤??㈠ぐひ???ㄠ???????孉摆潉楐???ぴ???う?????ぴ????彦??崠?扮牦?孲??嵴??楮甠?塲???关楳?????楖??儮?‵圳甮???‰場甮攠″圳????楛湤??夺??堰椮愱漰‰????昴昰椲挰椭攸渱琴?搭攲瑟攳捝琼楢潲渾?漲昷?挠汇潯湬敬摥?慐琬琠慊捡歫獯?晳潳牯?氠慍爬朠敊?獥捬慳氠敁?删????卲祳獯瑮攠浐献???敩捶瑥畲牳敡?丠潲瑥攭獥?楣湲??潴浩灯畮琠敦牯?匠捭楩數湮捥整??㈠が??????????????孮搠潃楯???ぴ???こ??????????????????ㄠ弱?崳?戱爷?嬮??嵯??愠爱氰甮挱挰椰漷?????愳猭瀵攴爰?吲??倶愰愭爲?????浢灲氾敛洲攸湝琠慓瑡楩潴湯?摊攬琠慒楹汯獵?潊晃?愠?浡畫汵瑲楡?瀠畋爮瀠潅獮敨??卣佩???????剡????瑦漠潵汮???湲??偬爠潲捥??潮晣?瑹桰整?坯潮爠歳獣桨潥灭?漠湦?割????卄攠捴畡牧楳琮礠???ぴふ?????????桩瑮琠灃???捵楴瑥敲猠敓散物硥?楣獥琬?瀲猰田?攬搳甲?猷栺漸眷挹椭琸椹渰朮?捤楯摩?????????戯爹?嬸??崭‵?田攭氳猰????刹楟瘸攴獝琼?割??′匹穝礠摈汥潮????吠桄攬?才氦漣挲欵攲爻?瑬慥杲??匮攠汈敡捳瑨椭療敡?扥汤漠捥歮楨湡杮?潥晭?剮????琠慬杯獣?晴潩牯?挠潰湲獩當浡散特?灦牯楲瘠慲捡祤???湲??偵牥潮捣??潩晤?瑮桴敩??っ瑡桴??????潶湩晣??漠湵??潮浧瀠當瑡敲特?慮湧搠??潥浮浴畩湦楩捥慲瑳椮漠湉獮?匠敓捡畮牤楨瑵礠??丠敔睨?奭潡牳欠??????倮爠敐獲獯??㈠はて????????ㄠ??孅摅漠楁???ち?ㄠ?????????????????嵥?扃牯?孰??嵩??甠敡汮獤?????牵慮楩湣慡牴摩????南潯晲瑫?扨汯潰捳欮椠湉杅???氠攲砰椰戴氮攠?戴氹漭挱欵攳爮?瑤慯杩猺?漱渰?琱栱攰?振桐故慒灃???渮?‰搰椴?嘱椲洷收爹挲愲瑝椼?卲???‰卝礠癍敯牬獮潡湲?偄??敓摯獰??偲牡漠捁??潗晡?瑮桥敲?坄漮爠歐獲桩潶灡?潹渠?偯牲椠癒慆捉祄?楴湨?瑯桵敧??汴敲捵瑳牴潥湤椠捣?卭潰捵楴敩瑮祧???の????ㄠ???孥摲潣楡??ㄠこ???????で??????ㄠげ水????崮?扐牲?季??嵯?删楴敨扥愠挲欰‰????牍椠獗灯潲????呰愠湯敮渠扐慲畩浶?????獮?祴潨略爠?捬慥瑣?楲湯普敩捣琠敓摯?睩楥瑴桹?愠?捃潍洠灐畲瑥敳牳?瘠椲爰田猵???渱?″倴爮潛捤??漺映?琰栮攱??琵栯??渰渲由愹氹?????′?渶瑝?汢??潛渳昱??潊湵?偬敳爠癁愬猠楓癹敶??潳浯灮甠瑐椬渠杂?慩湬摥??潄洮洠畈湩楧捨愭瑐楯潷湥獲??乲敯睸?奥潳爠武?????????どの????ぉ?㈠ば?孩摶潡楣???の?ㄠ?ぴ??偩?剹?传??呼?い????嵩?戠片?嬠?ち嵲?剩楮攠扄愬挠步?????慲祯摣愮搠橯楦攠癴?????物楶獡灣潹?????潮晣浩慮湧?剔??周慮湯敬湯执慩略浳??????灩汮愬琠晈潥物浤?晬潢牥?剧????獲敩据畧牥楲琭祖?慲湬摡?瀬爠椲瘰愰挶礮?愲搱洰椭渲椲猶琮牛慤瑯楩漺渠?‰?渱?‰倷爯漱挱??漷昸″琱桟攱???瑢桲 ̄?愳爲杝攠??湴獺瑧慥汲氠慃琬椠潆湬…匣礲猴琶攻浲??摭浥楩湥楲猠瑃爬愠瑂楯潵湲??潩湮映??圠慆獬桥楩湳杣瑨漠湅??啍卡?乩?塧??獡獤潩捯椠慦瑲楥潱湵???べ????????ど???桩瑯瑮瀠獶???睢睬睥?畁猠敗湡楴硣??潯牧朠?污敧朮愠捉祮?攠癐敲湯瑣献?汯楦猠慴と??瑐敥捲桶?牳楩敶扥愠捃歯?牰極整扩慮捧欠?灮摤映?扯牭?孵??嵣?婴桩慯湮杳?套????畨潯?????湥?椠浙灯牲潫瘺攠摉?剅???′瀰爰椷瘮愠挳礵′瀭爳漵琶攮捛瑤楯潩渺?猱挰栮攱洱攰?戯慐獅敒摃?潍湗??愰猰样?挶栳慝椼湢? ̄?渳??倠牒潩捥??潣晫?瑍桒攬?至ひ?び??渠瑂?氠??潮湥普??潵湭??潓朮椠獋瑥楥捰猠??渠杢楬湯散敫物楮渧朠?慮渠摴??渠瑦敲汥汥椠杷敯湲瑬?吺爠慐湥獲灳潯牮瑡慬琠楡潣湣?即祳猠瑣敯浮獴?????呯卲??????は??ㄠ???孄搠潴楡?????????????吠卯?㈠ぴ?づ????????嵴?扬爠?孯??嵳?乯楰琠桯祮愠湓慥湣摵?剩??吠獐畲摯楴歯????售稠畂湥????刬攠慈摥敩牤獥?扢敥桲慧瘺椠湓杰?扩慮摧汥祲??剥敲慬摡敧爬?爲攰瘰漷挮愠琵椱漭渵?椮湛?偯???戱愰献攱搰‰刷????猭礳猭琵攴洰猭???攵挶琭甲牟收?丼潢瑲放獛″椴湝??潩浥灢畡瑣敫爠?匬挠楃敲湩捳数??自?ㄠご????????????孒摆潉楄???ち??どち???????????????????开?崀?戀爀?嬀??崀??氀愀瘀椀?匀????愀最栀攀爀礀?????戀搀漀氀洀愀氀攀欀椀????匀攀挀甀爀椀琀礀?愀渀搀?瀀爀椀瘀愀挀礀?昀氀愀眀猀?椀渀?愀?爀攀挀攀渀琀?愀甀琀栀攀渀琀椀挀愀琀椀漀渀?瀀爀漀琀漀挀漀氀?昀漀爀??倀????????刀????琀愀最猀???搀瘀愀渀挀攀猀?椀渀??漀洀瀀甀琀攀爀?匀挀椀攀渀挀攀???渀??渀琀?氀??漀甀爀渀愀氀??? ???????????????戀爀?嬀??崀??椀?一???甀?夀??匀甀猀椀氀漀?圀???甀漀?????嘀愀爀愀搀栀愀爀愀樀愀渀?嘀??倀爀椀瘀愀挀礀?倀爀攀猀攀爀瘀椀渀最?愀甀琀栀漀爀椀稀攀搀?刀????愀甀琀栀攀渀琀椀挀愀琀椀漀渀?瀀爀漀琀漀挀漀氀猀???攀挀琀甀爀攀?一漀琀攀猀?椀渀??漀洀瀀甀琀攀爀?匀挀椀攀渀挀攀??? ????????? ??????嬀搀漀椀??? ??  ?????????????? ????开?崀?戀爀?嬀??崀?儀椀愀渀?堀????椀甀?堀???夀愀渀最?匀???娀甀漀????匀攀挀甀爀椀琀礀?愀渀搀?瀀爀椀瘀愀挀礀?愀渀愀氀礀猀椀猀?漀昀?琀爀攀攀??匀????瀀爀漀琀漀挀漀氀??圀椀爀攀氀攀猀猀?倀攀爀猀漀渀愀氀??漀洀洀甀渀椀挀愀琀椀漀渀猀??? ????????????????嬀搀漀椀??? ??  ??猀?????? ????????砀崀?戀爀?嬀??崀?一椀甀????娀栀甀?堀夀???栀椀??吀???椀????倀爀椀瘀愀挀礀?愀渀搀?愀甀琀栀攀渀琀椀挀愀琀椀漀渀?瀀爀漀琀漀挀漀氀?昀漀爀?洀漀戀椀氀攀?刀????猀礀猀琀攀洀猀??圀椀爀攀氀攀猀猀?倀攀爀猀漀渀愀氀??漀洀洀甀渀椀挀愀琀椀漀渀猀??? ???????????????嬀搀漀椀??? ??  ??猀?????? ????? ???崀?戀爀?嬀??崀?匀栀攀渀????娀栀攀渀最?圀夀??圀愀渀最????堀椀愀?娀????甀?娀???匀琀甀搀礀?漀昀?琀栀攀?瀀爀椀瘀愀挀礀?洀漀搀攀氀猀?椀渀?刀????愀甀琀栀攀渀琀椀挀愀琀椀漀渀?瀀爀漀琀漀挀漀氀猀???渀琀?氀??漀甀爀渀愀氀?漀昀?匀攀挀甀爀椀琀礀?愀渀搀?椀琀猀??瀀瀀氀椀挀愀琀椀漀渀猀??? ?????????????????戀爀?嬀??崀??瘀漀椀渀攀?????椀渀最??????氀??????愀爀瀀攀渀琀?堀??夀愀氀挀椀渀?匀?伀??倀爀椀瘀愀挀礀??爀椀攀渀搀氀礀?愀甀琀栀攀渀琀椀挀愀琀椀漀渀?椀渀?刀????猀礀猀琀攀洀猀??伀渀?猀甀戀?氀椀渀攀愀爀?瀀爀漀琀漀挀漀氀猀?戀愀猀攀搀?漀渀?猀礀洀洀攀琀爀椀挀?欀攀礀?挀爀礀瀀琀漀最爀愀瀀栀礀???????吀爀愀渀猀??漀渀??漀戀椀氀攀??漀洀瀀甀琀椀渀最??? ??????? ??? ???? ???嬀搀漀椀??? ??? ??吀???? ??????崀?戀爀?嬀??崀?匀愀搀椀欀椀渀??????礀愀猀????匀攀挀甀爀椀琀礀?愀渀搀?瀀爀椀瘀愀挀礀?瀀爀漀琀漀挀漀氀?昀漀爀?攀洀攀爀最椀渀最?猀洀愀爀琀?刀????愀瀀瀀氀椀挀愀琀椀漀渀猀???渀??倀爀漀挀??漀昀?琀栀攀???琀栀?????????匀??渀琀?氀??漀渀昀??漀渀?匀漀昀琀眀愀爀攀??渀最椀渀攀攀爀椀渀最???爀琀椀昀椀挀椀愀氀??渀琀攀氀氀椀最攀渀挀攀??一攀琀眀漀爀欀椀渀最?愀渀搀?倀愀爀愀氀氀攀氀??椀猀琀爀椀戀甀琀攀搀??漀洀瀀甀琀椀渀最???琀氀愀渀琀愀????????漀洀瀀甀琀攀爀?匀漀挀椀攀琀礀??? ????????嬀搀漀椀??? ??? ??匀一倀??? ??????????崀?戀爀?嬀? 崀??甀漀?夀????椀愀渀最?????圀愀渀最?匀夀???椀渀最?堀???椀渀最????娀栀愀渀最?娀???娀栀愀渀最?夀????椀氀琀攀爀椀渀最?愀渀搀?挀氀攀愀渀椀渀最?昀漀爀?刀????猀琀爀攀愀洀椀渀最?搀愀琀愀?琀攀挀栀渀漀氀漀最礀?戀愀猀攀搀?漀渀?昀椀渀椀琀攀?猀琀愀琀攀?洀愀挀栀椀渀攀??刀甀愀渀??椀愀渀?堀甀攀??愀漀??漀甀爀渀愀氀?漀昀?匀漀昀琀眀愀爀攀??? ????????????????????栀琀琀瀀???眀眀眀?樀漀猀?漀爀最?挀渀??   ???????????栀琀洀嬀搀漀椀??? ???????樀?挀渀欀椀?樀漀猀?  ????崀?戀爀?嬀??崀??愀??匀???漀眀?挀漀猀琀?刀????愀甀琀栀攀渀琀椀挀愀琀椀漀渀?瀀爀漀琀漀挀漀氀?眀椀琀栀?昀漀爀眀漀爀搀?瀀爀椀瘀愀挀礀???栀椀渀攀猀攀??漀甀爀渀愀氀?漀昀??漀洀瀀甀琀攀爀猀??? ????????????????????椀渀??栀椀渀攀猀攀?眀椀琀栀??渀最氀椀猀栀?愀戀猀琀爀愀挀琀??嬀搀漀椀??? ??????匀倀???? ???? ??? ????崀?戀爀?嬀??崀?娀栀愀渀最?????漀甀?娀???圀愀渀最???????渀攀眀?猀攀挀甀爀椀琀礀?愀渀搀?瀀爀椀瘀愀挀礀?漀渀?刀????洀甀琀甀愀氀?愀甀琀栀攀渀琀椀挀愀琀椀漀渀?瀀爀漀琀漀挀漀氀?戀愀猀攀搀?漀渀?瀀愀爀琀椀愀氀??????漀甀爀渀愀氀?漀昀??氀攀挀琀爀漀渀椀挀猀??愀洀瀀???渀昀漀爀洀愀琀椀漀渀?吀攀挀栀渀漀氀漀最礀???  ?????????????????椀渀??栀椀渀攀猀攀?眀椀琀栀??渀最氀椀猀栀?愀戀猀琀爀愀挀琀???戀爀?嬀??崀?圀愀渀最?匀????椀甀?匀????栀攀渀??圀??匀挀愀氀愀戀氀攀?刀????洀甀琀甀愀氀?愀甀琀栀攀渀琀椀挀愀琀椀漀渀?瀀爀漀琀漀挀漀氀?眀椀琀栀?戀愀挀欀眀愀爀搀?瀀爀椀瘀愀挀礀???漀甀爀渀愀氀?漀昀??漀洀瀀甀琀攀爀?刀攀猀攀愀爀挀栀?愀渀搀??攀瘀攀氀漀瀀洀攀渀琀??? ???? ???????????????椀渀??栀椀渀攀猀攀?眀椀琀栀??渀最氀椀猀栀?愀戀猀琀爀愀挀琀???戀爀?嬀??崀?娀攀渀最?????堀椀漀渀最?娀??娀栀愀渀最?吀???攀礀?瘀愀氀甀攀?爀攀渀攀眀愀氀?爀愀渀搀漀洀?栀愀猀栀?氀漀挀欀?昀漀爀?猀攀挀甀爀椀琀礀?愀渀搀?瀀爀椀瘀愀挀礀?攀渀栀愀渀挀攀洀攀渀琀?漀昀?刀??????漀洀瀀甀琀攀爀??渀最椀渀攀攀爀椀渀最???  ?????????????????椀渀??栀椀渀攀猀攀?眀椀琀栀??渀最氀椀猀栀?愀戀猀琀爀愀挀琀??嬀搀漀椀??? ??????樀?椀猀猀渀??   ???????  ?? ?? ??崀?戀爀?嬀??崀?圀甀?吀吀???椀?????匀琀甀搀礀?漀渀?刀????漀爀椀攀渀琀攀搀?氀漀挀愀琀椀漀渀?瀀爀椀瘀愀挀礀?瀀爀漀琀攀挀琀椀漀渀?愀氀最漀爀椀琀栀洀???漀洀瀀甀琀攀爀?吀攀挀栀渀漀氀漀最礀?愀渀搀??攀瘀攀氀漀瀀洀攀渀琀??? ??????????????? ??椀渀??栀椀渀攀猀攀?眀椀琀栀??渀最氀椀猀栀?愀戀猀琀爀愀挀琀??嬀搀漀椀??? ??????樀?椀猀猀渀?????????堀?? ??? ?? ??崀?戀爀?嬀??崀?娀栀漀甀?夀????攀渀最??????攀猀椀最渀?愀渀搀?愀渀愀氀礀猀椀猀?漀昀?挀爀礀瀀琀漀最爀愀瀀栀椀挀?瀀爀漀琀漀挀漀氀猀?昀漀爀?刀??????栀椀渀攀猀攀??漀甀爀渀愀氀?漀昀??漀洀瀀甀琀攀爀猀???  ?????????????????椀渀??栀椀渀攀猀攀?眀椀琀栀??渀最氀椀猀栀?愀戀猀琀爀愀挀琀??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????
    相似文献
    引证文献
引用本文

周世杰,张文清,罗嘉庆.射频识别(RFID)隐私保护技术综述.软件学报,2015,26(4):960-976

复制
相关视频

分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2013-04-18
  • 最后修改日期:2014-12-09
  • 在线发布日期: 2015-02-06
文章二维码
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号