Sciweavers

1790 search results - page 10 / 358
» On Privacy Models for RFID
Sort
View
ACISP
2009
Springer
15 years 6 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
15 years 6 months ago
A Model of Antecedents of RFID Adoption Intention in the Supply Chain
The application of the Radio Frequency Identification (RFID) technology in the supply chain has experienced increased attention in academic research and practice. There is, howeve...
Maria Madlberger
VLDB
2005
ACM
159views Database» more  VLDB 2005»
15 years 5 months ago
Temporal Management of RFID Data
RFID technology can be used to significantly improve the efficiency of business processes by providing the capability of automatic identification and data capture. This technol...
Fusheng Wang, Peiya Liu
UCS
2007
Springer
15 years 5 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
ESORICS
2008
Springer
15 years 1 months ago
User Privacy in Transport Systems Based on RFID E-Tickets
Abstract. Recently, operators of public transportation in many countries started to roll out electronic tickets (e-tickets). E-tickets offer several advantages to transit enterpris...
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachs...