Sciweavers

2363 search results - page 32 / 473
» How Secure is RFID
Sort
View
ESORICS
2009
Springer
15 years 11 months ago
Untraceable Tags Based on Mild Assumptions
Radio frequency identification (RFID) chips have been widely deployed in large-scale systems such as inventory control and supply chain management. While RFID technology has much...
Carlo Blundo, Angelo De Caro, Giuseppe Persiano
WISA
2009
Springer
15 years 8 months ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar
CARDIS
2010
Springer
159views Hardware» more  CARDIS 2010»
15 years 7 months ago
Modeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only ...
Flavio D. Garcia, Peter van Rossum
IROS
2006
IEEE
153views Robotics» more  IROS 2006»
15 years 10 months ago
RFID Technology-based Exploration and SLAM for Search And Rescue
— Robot search and rescue is a time critical task, i.e. a large terrain has to be explored by multiple robots within a short amount of time. The efficiency of exploration depend...
Alexander Kleiner, Johann Prediger, Bernhard Nebel