Sciweavers

1790 search results - page 26 / 358
» On Privacy Models for RFID
Sort
View
MOBICOM
2010
ACM
15 years 12 hour ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
MOBISYS
2009
ACM
16 years 10 days ago
Longitudinal study of a building-scale RFID ecosystem
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such depl...
Evan Welbourne, Karl Koscher, Emad Soroush, Magdal...
JTAER
2008
82views more  JTAER 2008»
14 years 11 months ago
Effects of the RFID Mandate on Supply Chain Management
Recently, radio frequency identification (RFID) is being explored as a technology to be used in supply chain management. The use of RFID in the supply chain is an emerging technol...
Chin-Boo Soon, Jairo A. Gutiérrez
PERCOM
2007
ACM
15 years 11 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
RFIDSEC
2010
14 years 10 months ago
Strong Authentication and Strong Integrity (SASI) Is Not That Strong
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming proba...
Gildas Avoine, Xavier Carpent, Benjamin Martin 000...