Sciweavers

2363 search results - page 10 / 473
» How Secure is RFID
Sort
View
ESORICS
2009
Springer
16 years 4 months ago
Secure Ownership and Ownership Transfer in RFID Systems
We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitio...
Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, Pi...
132
Voted
UCS
2004
Springer
15 years 9 months ago
Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols
Today’s RFID protocols that govern the communication between RFID readers and tags are solely optimized for performance, but fail to address consumer privacy concerns by support...
Christian Floerkemeier, Roland Schneider, Marc Lan...
125
Voted
CIS
2006
Springer
15 years 7 months ago
Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment
The emerging ubiquitous computing is changing the current computing paradigm, and it lets the ubiquitous RFID applications consistently and independently utilize the sensed inform...
Dongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyu...
116
Voted
CORR
2010
Springer
121views Education» more  CORR 2010»
15 years 3 months ago
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is necessary to study how to construct RFID network system ...
Shin-ichi Kuribayashi
137
Voted
ESWA
2010
109views more  ESWA 2010»
15 years 2 months ago
Visual and tangible interactions with physical and virtual objects using context-aware RFID
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation and interface technology with physical and virtual objects in the ubiquitous comp...
Jae Yeol Lee, Dong Woo Seo, Byung Youn Song, Rajit...