Sciweavers

CCS
2009
ACM
13 years 2 months ago
RFID privacy: relation between two notions, minimal condition, and efficient construction
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions: one based on the indistinguishability of t...
Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li
ISW
2010
Springer
13 years 2 months ago
Privacy-Preserving ECC-Based Grouping Proofs for RFID
The concept of grouping proofs has been introduced by Juels to permit RFID tags to generate a verifiable proof that they have been scanned simultaneously, even when readers or tags...
Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Sing...
TC
2008
13 years 4 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...
PERCOM
2008
ACM
13 years 4 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 4 months ago
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is necessary to study how to construct RFID network system ...
Shin-ichi Kuribayashi
CN
2008
83views more  CN 2008»
13 years 4 months ago
A framework for fast RFID tag reading in static and mobile environments
A framework for reducing the average reading time of passive RFID tags in dense environments is introduced. The proposed framework termed Accelerated Frame Slotted ALOHA (AFSA) ca...
Venkatesh Sarangan, M. R. Devarapalli, Sridhar Rad...
ICISC
2007
102views Cryptology» more  ICISC 2007»
13 years 6 months ago
Passive Attacks on a Class of Authentication Protocols for RFID
Abstract. Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent u...
Basel Alomair, Loukas Lazos, Radha Poovendran
HUC
2004
Springer
13 years 10 months ago
Reminding About Tagged Objects Using Passive RFIDs
People often misplace objects they care about. We present a system that generates reminders about objects left behind by tagging those objects with passive RFID tags. Readers posit...
Gaetano Borriello, Waylon Brunette, Matthew Hall, ...
ISCAS
2007
IEEE
129views Hardware» more  ISCAS 2007»
13 years 10 months ago
ECC Processor with Low Die Size for RFID Applications
Abstract— This paper presents the design of a special purpose processor with Elliptic Curve Digital Signature Algorithm (ECDSA) functionality. This digital signature generation d...
Franz Fürbass, Johannes Wolkerstorfer
INFOCOM
2007
IEEE
13 years 11 months ago
RFID-Based 3-D Positioning Schemes
Abstract— This research focuses on RFID-based 3-D positioning schemes, aiming to locate an object in a 3-dimensional space, with reference to a predetermined arbitrary coordinate...
Chong Wang, Hongyi Wu, Nian-Feng Tzeng