Sciweavers

250 search results - page 10 / 50
» More on the Security of Linear RFID Authentication Protocols
Sort
View
108
Voted
CARDIS
2010
Springer
159views Hardware» more  CARDIS 2010»
15 years 5 months ago
Modeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only ...
Flavio D. Garcia, Peter van Rossum
145
Voted
PERCOM
2005
ACM
16 years 1 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
IJSN
2010
148views more  IJSN 2010»
15 years 7 days ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh
104
Voted
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
15 years 8 months ago
The Security of EPC Gen2 Compliant RFID Protocols
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very b...
Mike Burmester, Breno de Medeiros
123
Voted
NETWORKING
2007
15 years 3 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...