Sciweavers

2363 search results - page 34 / 473
» How Secure is RFID
Sort
View
WOA
2000
15 years 5 months ago
How a Secure and Open Mobile Agent Framework Suits Electronic Commerce Applications
The Mobile Agent (MA) paradigm seems able to support effectively distributed applications in open and heterogeneous environments, and application areas such as ecommerce appear to...
Paolo Bellavista, Antonio Corradi, Rebecca Montana...
EJWCN
2010
118views more  EJWCN 2010»
14 years 11 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
SP
2002
IEEE
143views Security Privacy» more  SP 2002»
15 years 3 months ago
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
In this paper, we introduce a new class of side
Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, S...
PERCOM
2007
ACM
16 years 3 months ago
A Context Middleware Based on Sensor and RFID Information
Pervasive computing environments have traditionally used distributed sensors to gather user context. EPC (Electronic Product Code) information extracted from RFID tags could addit...
Daeyoung Kim, Tomás Sánchez Ló...
CSFW
2000
IEEE
15 years 8 months ago
How to Prevent Type Flaw Attacks on Security Protocols
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
James Heather, Gavin Lowe, Steve Schneider