Sciweavers

2363 search results - page 26 / 473
» How Secure is RFID
Sort
View
ICUIMC
2009
ACM
15 years 1 months ago
Enhancement of the RFID security method with ownership transfer
Hsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-L...
COMCOM
2011
14 years 11 months ago
An RFID secure authentication mechanism in WLAN
Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Ha...
GLOBECOM
2007
IEEE
15 years 10 months ago
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme
— A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme was recently proposed as an improvement over the original authentication protocol s...
Tong-Lee Lim, Tieyan Li
HUC
2007
Springer
15 years 10 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
BROADNETS
2006
IEEE
15 years 10 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...