Sciweavers

2363 search results - page 3 / 473
» How Secure is RFID
Sort
View
WASA
2009
Springer
93views Algorithms» more  WASA 2009»
15 years 10 months ago
Experimental Study on Mobile RFID Performance
Abstract. An increasing number of applications use RFID in their design, but there is a lack of understanding of how mobility affects RFID performance in these applications. Unlik...
Zhong Ren, Chiu Chiang Tan, Dong Wang, Qun Li
JCS
2011
156views more  JCS 2011»
14 years 10 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
15 years 4 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung
WPES
2005
ACM
15 years 8 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
111
Voted
IEEEIAS
2009
IEEE
15 years 10 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang