Sciweavers

2363 search results - page 5 / 473
» How Secure is RFID
Sort
View
172
Voted
JCM
2006
112views more  JCM 2006»
15 years 3 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
137
Voted
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
15 years 9 months ago
A Taxonomy for RFID
—Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriente...
Taimur Hassan, Samir Chatterjee
213
Voted
SOUPS
2009
ACM
15 years 10 months ago
Treat 'em like other devices: user authentication of multiple personal RFID tags
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
140
Voted
PERVASIVE
2004
Springer
15 years 9 months ago
Issues with RFID Usage in Ubiquitous Computing Applications
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in the ubiquitous computing domain. In this paper we present various s...
Christian Floerkemeier, Matthias Lampe
PERCOM
2007
ACM
16 years 3 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins