Results 1 - 10
of
255
Keep on blockin’ in the free world: Personal access control for lowcost RFID tags
- in Proc. 13th International Workshop on Security Protocols. LNCS
, 2005
"... Abstract. This paper introduces an off-tag RFID access control mech-anism called “Selective RFID Jamming”. Selective RFID Jamming pro-tects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it ..."
Abstract
-
Cited by 9 (4 self)
- Add to MetaCart
Abstract. This paper introduces an off-tag RFID access control mech-anism called “Selective RFID Jamming”. Selective RFID Jamming pro-tects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because
A platform for RFID security and privacy administration
- In Proceedings of the 20th Conference on Large installation System Administration (Washington, DC, December 03 - 08, 2006). USENIX Association
, 2006
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’ ’ that monitors and controls access to RFID tags by combining a standard-issue RFID read ..."
Abstract
-
Cited by 20 (0 self)
- Add to MetaCart
This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’ ’ that monitors and controls access to RFID tags by combining a standard-issue RFID
Abstract A Platform for RFID Security and Privacy Administration
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a stan ..."
Abstract
- Add to MetaCart
This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a
Rethinking RFID: awareness and control for interaction with RFID systems
- Proceedings of the 28th international conference on Human factors in
, 2010
"... All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.
Physical Access Control for Captured RFID Data
, 2007
"... This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's co ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. © 2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. For more information, please see www.ieee.org/web/publications/rights/index.html.
Readers Behaving Badly Reader Revocation in PKI-Based RFID Systems
"... Abstract. Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In t ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
feature of personal RFID tags used in authentication, access control or payment applications – the involvement of a human user. We take advantage of the user’s awareness and presence to construct a simple, efficient, secure and (most importantly) feasible solution. We evaluate the usability and practical
Secured Access Control for Vehicles in RFID Systems on Roads
"... Abstract-Vehicle access control systems exist everywhere in our daily life. However, the simple permit based verification method is not sufficient for the critical departments such as banks and courts, which need to check not only the identity of the vehicles but also the vehicle route before reach ..."
Abstract
- Add to MetaCart
reaching the restricted area, as the vehicles can have the access permit if and only if they have traveled along the pre-defined routes. To meet the route tracking requirement, we proposed a novel access control systems based on the RFID systems on Roads. Particularly, we designed a key cloaking method
Encryption-Enforced Access Control for an RFID Discovery Service
"... In this demonstration we present a novel encryption scheme for enforcing access control in a Discovery Service. A Dis-covery Service is a piece of software that allows one to ”dis-cover ” item-level data which is stored in data repositories of different companies. Such data can be gathered with the ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
In this demonstration we present a novel encryption scheme for enforcing access control in a Discovery Service. A Dis-covery Service is a piece of software that allows one to ”dis-cover ” item-level data which is stored in data repositories of different companies. Such data can be gathered
CHECK THE DATE: Reader Revocation in PKI-Based RFID Systems
"... Abstract—One prominent open problem with RFID tags that support public key cryptography is revocation of reader certificates. This is an important issue considering that highend RFID tags are geared for public key applications such as e-documents and contactless payment instruments. Furthermore, the ..."
Abstract
- Add to MetaCart
begin by observing an important distinguishing feature of personal RFID tags used in authentication, access control or payment applications- the involvement of a human user. We then take advantage of the user’s awareness and presence to construct a simple, efficient, secure and (most importantly
Results 1 - 10
of
255