In September 2009, David and Prasad proposed at MobiSec’09 an interesting new ultralightweight mutual authentication protocol for low-cost RFID tags. In this paper, we present a ...
Abstract--Arbitration and scheduling of multiple tags in stateof-the-art Radio Frequency Identification (RFID) systems is accomplished on the medium access control layer. Currently...
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Collaborative software projects such as Linux and Apache have shown that a large, complex system can be built and maintained by many developers working in a highly parallel, relat...
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...