• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 255
Next 10 →

Computer Systems Group

by Melanie R. Rieback, Bruno Crispo, Andrew S
"... This paper introduces an off-tag RFID access control ..."
Abstract - Add to MetaCart
This paper introduces an off-tag RFID access control

Keep on blockin’ in the free world: Personal access control for lowcost RFID tags

by Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum - in Proc. 13th International Workshop on Security Protocols. LNCS , 2005
"... Abstract. This paper introduces an off-tag RFID access control mech-anism called “Selective RFID Jamming”. Selective RFID Jamming pro-tects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it ..."
Abstract - Cited by 9 (4 self) - Add to MetaCart
Abstract. This paper introduces an off-tag RFID access control mech-anism called “Selective RFID Jamming”. Selective RFID Jamming pro-tects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because

A platform for RFID security and privacy administration

by Georgi N. Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman - In Proceedings of the 20th Conference on Large installation System Administration (Washington, DC, December 03 - 08, 2006). USENIX Association , 2006
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’ ’ that monitors and controls access to RFID tags by combining a standard-issue RFID read ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ‘‘RFID firewall,’ ’ that monitors and controls access to RFID tags by combining a standard-issue RFID

Abstract A Platform for RFID Security and Privacy Administration

by Melanie R. Rieback, Georgi N. Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum
"... This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a stan ..."
Abstract - Add to MetaCart
This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an “RFID firewall”, enabling individuals to monitor and control access to their RFID tags by combining a

Rethinking RFID: awareness and control for interaction with RFID systems

by Nicolai Marquardt, Alex S. Taylor, Saul Greenberg, Nicolai Marquardt, Alex S. Taylor, Nicolas Villar, Saul Greenberg - Proceedings of the 28th international conference on Human factors in , 2010
"... All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.

Physical Access Control for Captured RFID Data

by Travis Kriplean, Evan Welbourne, Nodira Khoussainova, Vibhor Rastogi, Magdalena Balazinska, Gaetano Borriello, Tadayoshi Kohno, Dan Suciu , 2007
"... This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's co ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. © 2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. For more information, please see www.ieee.org/web/publications/rights/index.html.

Readers Behaving Badly Reader Revocation in PKI-Based RFID Systems

by Rishab Nithyan, Gene Tsudik, Ersin Uzun
"... Abstract. Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In t ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
feature of personal RFID tags used in authentication, access control or payment applications – the involvement of a human user. We take advantage of the user’s awareness and presence to construct a simple, efficient, secure and (most importantly) feasible solution. We evaluate the usability and practical

Secured Access Control for Vehicles in RFID Systems on Roads

by Yanfei Lu , Xin Li , Xing Wei , Tao Jing , Wei Cheng , Yan Huo
"... Abstract-Vehicle access control systems exist everywhere in our daily life. However, the simple permit based verification method is not sufficient for the critical departments such as banks and courts, which need to check not only the identity of the vehicles but also the vehicle route before reach ..."
Abstract - Add to MetaCart
reaching the restricted area, as the vehicles can have the access permit if and only if they have traveled along the pre-defined routes. To meet the route tracking requirement, we proposed a novel access control systems based on the RFID systems on Roads. Particularly, we designed a key cloaking method

Encryption-Enforced Access Control for an RFID Discovery Service

by Florian Kerschbaum, Leonardo Weiss, Ferreira Chaves
"... In this demonstration we present a novel encryption scheme for enforcing access control in a Discovery Service. A Dis-covery Service is a piece of software that allows one to ”dis-cover ” item-level data which is stored in data repositories of different companies. Such data can be gathered with the ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
In this demonstration we present a novel encryption scheme for enforcing access control in a Discovery Service. A Dis-covery Service is a piece of software that allows one to ”dis-cover ” item-level data which is stored in data repositories of different companies. Such data can be gathered

CHECK THE DATE: Reader Revocation in PKI-Based RFID Systems

by Rishab Nithyanand, Gene Tsudik, Ersin Uzun
"... Abstract—One prominent open problem with RFID tags that support public key cryptography is revocation of reader certificates. This is an important issue considering that highend RFID tags are geared for public key applications such as e-documents and contactless payment instruments. Furthermore, the ..."
Abstract - Add to MetaCart
begin by observing an important distinguishing feature of personal RFID tags used in authentication, access control or payment applications- the involvement of a human user. We then take advantage of the user’s awareness and presence to construct a simple, efficient, secure and (most importantly
Next 10 →
Results 1 - 10 of 255
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University