Sciweavers

IACR
2011
87views more  IACR 2011»
12 years 4 months ago
Untangling RFID Privacy Models
This article investigates privacy in Radio Frequency IDentification (RFID) systems. We survey the eight most well-known RFID privacy models. We examine their advantages and drawba...
Iwen Coisel, Tania Martin
JCS
2011
156views more  JCS 2011»
12 years 11 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
ICNP
2009
IEEE
13 years 2 months ago
RASPberry: A Stable Reader Activation Scheduling Protocol in Multi-Reader RFID Systems
Abstract--Recent technological advances have motivated largescale deployment of RFID systems. RFID readers are often static and carefully deployed in a planned manner. However, the...
ShaoJie Tang, Jing Yuan, Xiang-Yang Li, Guihai Che...
INDOCRYPT
2010
Springer
13 years 2 months ago
Getting a Few Things Right and Many Things Wrong
: Radio frequency identification (RFID) is a technology for the automated identification of physical entities using radio frequency transmissions. In the past ten years, RFID syste...
Neal Koblitz
IJRFITA
2007
115views more  IJRFITA 2007»
13 years 4 months ago
Environmental and performance analysis of SAW-based RFID systems
: This paper describes the environmental effects and performance analysis of 2.45 GHz Surface Acoustic Wave (SAW) based RFID systems. Piezoelectric materials and their underlying p...
Darmindra D. Arumugam, Daniel W. Engels, Amar Modi
IJIPT
2007
91views more  IJIPT 2007»
13 years 4 months ago
Multi-tag RFID systems
: Successful object identification is the primary objective of radio frequency identification (RFID) technology. Yet, a recent major study by Wal-Mart has shown that object detec...
Leonid Bolotnyy, Gabriel Robins
JCM
2006
112views more  JCM 2006»
13 years 4 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 4 months ago
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
Abstract. Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate...
Gildas Avoine, Aslan Tchamkerten
ESORICS
2010
Springer
13 years 5 months ago
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Abstract. Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and...
Rishab Nithyanand, Gene Tsudik, Ersin Uzun
ICDCS
2010
IEEE
13 years 6 months ago
ASAP: Scalable Identification and Counting for Contactless RFID Systems
The growing importance of operations such as identification, location sensing and object tracking has led to increasing interests in contactless Radio Frequency Identification (RFI...
Chen Qian, Yunhuai Liu, Hoilun Ngan, Lionel M. Ni