Sciweavers

96 search results - page 13 / 20
» Privacy preserving on Radio Frequency Identification systems
Sort
View
ARCS
2006
Springer
15 years 3 months ago
Prototypical Implementation of Location-Aware Services Based on Super-Distributed RFID Tags
Abstract. We provide evidence of the feasibility and effectiveness of a middleware architecture for mobile devices which employs dense distributions of small computerized entities ...
Jürgen Bohn
IJNVO
2007
72views more  IJNVO 2007»
14 years 11 months ago
RFID as enabler for the boundless real-time organisation: empirical insights from Germany
: Radio Frequency Identification (RFID) is currently considered a hot topic in the IT arena. It is described as a major enabling technology for automated contactless wireless data ...
Jan Marco Leimeister, Uta Franziska Knebel, Helmut...
PERCOM
2006
ACM
15 years 11 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
PERCOM
2005
ACM
15 years 11 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
PET
2004
Springer
15 years 5 months ago
Electromagnetic Eavesdropping Risks of Flat-Panel Displays
Electromagnetic eavesdropping of computer displays – first demonstrated to the general public by van Eck in 1985 – is not restricted to cathode-ray tubes. Modern flat-panel d...
Markus G. Kuhn