Sciweavers

191 search results - page 4 / 39
» Designing with RFID
Sort
View
CCS
2003
ACM
13 years 11 months ago
The blocker tag: selective blocking of RFID tags for consumer privacy
We propose the use of “selective blocking” by “blocker tags” as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or...
Ari Juels, Ronald L. Rivest, Michael Szydlo
ISW
2010
Springer
13 years 4 months ago
Privacy-Preserving ECC-Based Grouping Proofs for RFID
The concept of grouping proofs has been introduced by Juels to permit RFID tags to generate a verifiable proof that they have been scanned simultaneously, even when readers or tags...
Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Sing...
ESORICS
2010
Springer
13 years 7 months ago
A New Framework for RFID Privacy
Formal RFID security and privacy frameworks are fundamental to the design and analysis of robust RFID systems. In this paper, we develop a new definitional framework for RFID priv...
Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao
GLOBECOM
2010
IEEE
13 years 4 months ago
Feasibility and Benefits of Passive RFID Wake-Up Radios for Wireless Sensor Networks
Energy efficiency is one of the crucial design criteria for wireless sensor networks. Idle listening constitutes a major part of energy waste, and thus solutions such as duty cycli...
He Ba, Ilker Demirkol, Wendi Rabiner Heinzelman
MOBIHOC
2010
ACM
13 years 4 months ago
Identifying the missing tags in a large RFID system
Comparing with the classical barcode system, RFID extends the operational distance from inches to a number of feet (passive RFID tags) or even hundreds of feet (active RFID tags)....
Tao Li, Shigang Chen, Yibei Ling