Sciweavers

173 search results - page 2 / 35
» Classification of RFID Attacks
Sort
View
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
13 years 11 months ago
A Taxonomy for RFID
—Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriente...
Taimur Hassan, Samir Chatterjee
AFRICACRYPT
2010
Springer
13 years 11 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
NETWORKING
2007
13 years 6 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...
SOUPS
2009
ACM
13 years 11 months ago
Treat 'em like other devices: user authentication of multiple personal RFID tags
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 5 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem