Sciweavers

62 search results - page 2 / 13
» Privacy for RFID through trusted computing
Sort
View
UCS
2004
Springer
13 years 10 months ago
Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols
Today’s RFID protocols that govern the communication between RFID readers and tags are solely optimized for performance, but fail to address consumer privacy concerns by support...
Christian Floerkemeier, Roland Schneider, Marc Lan...
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
13 years 10 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
ACSAC
2002
IEEE
13 years 9 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
JCP
2007
121views more  JCP 2007»
13 years 4 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
PERCOM
2007
ACM
14 years 4 months ago
Making Radio Frequency Identification Visible - A Watchdog Tag
To address the privacy concerns associated with RFID, previous work proposed an approach, where RFID readers do not only broadcast commands to inventory tag populations, but also ...
Christian Metzger, Christian Floerkemeier, Philipp...