Sciweavers

2363 search results - page 3 / 473
» How Secure is RFID
Sort
View
WASA
2009
Springer
93views Algorithms» more  WASA 2009»
14 years 1 days ago
Experimental Study on Mobile RFID Performance
Abstract. An increasing number of applications use RFID in their design, but there is a lack of understanding of how mobility affects RFID performance in these applications. Unlik...
Zhong Ren, Chiu Chiang Tan, Dong Wang, Qun Li
JCS
2011
156views more  JCS 2011»
13 years 12 days ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
13 years 6 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung
WPES
2005
ACM
13 years 11 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
IEEEIAS
2009
IEEE
14 years 3 days ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang