Sciweavers

2363 search results - page 4 / 473
» How Secure is RFID
Sort
View
CCS
2009
ACM
13 years 4 months ago
RFID privacy: relation between two notions, minimal condition, and efficient construction
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions: one based on the indistinguishability of t...
Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li
PERCOM
2007
ACM
14 years 5 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
RFIDSEC
2010
13 years 4 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
IROS
2009
IEEE
180views Robotics» more  IROS 2009»
14 years 27 days ago
Particle filter-based trajectory estimation with passive UHF RFID fingerprints in unknown environments
Abstract— In this paper we present a novel approach to estimating the trajectory of a robot by means of inexpensive passive RFID tags and odometry in unknown environments. We sho...
Philipp Vorst, Andreas Zell
IWRT
2008
109views Communications» more  IWRT 2008»
13 years 7 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...