Sciweavers

2363 search results - page 27 / 473
» How Secure is RFID
Sort
View
JTAER
2008
103views more  JTAER 2008»
15 years 4 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu
RFIDSEC
2010
15 years 1 months ago
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensu...
Gildas Avoine, Benjamin Martin 0002, Tania Martin
IACR
2011
221views more  IACR 2011»
14 years 3 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
SAFECOMP
1999
Springer
15 years 8 months ago
Choosing Effective Methods for Design Diversity - How to Progress from Intuition to Science
Peter T. Popov, Lorenzo Strigini, Alexander B. Rom...