• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,126
Next 10 →

RFID security and privacy: A research survey

by Ari Juels - ISBN 978-89-5519-136-3 -88- Feb. 17-20, 2008 ICACT 2008 , 2006
"... Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next ..."
Abstract - Cited by 353 (6 self) - Add to MetaCart
Abstract—This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next

New Directions in RFID Security

by Erik-Oliver Blass , Refik Molva
"... Abstract. Current research in RFID security focuses on basic authentication protocols between a tag and a reader. In this paper, we claim that, in future, different new RFID-based scenarios will play an increasing role. In particular, we propose two new research directions: 1. Multi-Tag Security, a ..."
Abstract - Add to MetaCart
Abstract. Current research in RFID security focuses on basic authentication protocols between a tag and a reader. In this paper, we claim that, in future, different new RFID-based scenarios will play an increasing role. In particular, we propose two new research directions: 1. Multi-Tag Security

The evolution of rfid security

by Melanie R. Rieback, Bruno Crispo - IEEE Pervasive Computing , 2006
"... has been an obvious target for abuse. Wireless identification is a powerful capability, and RFID reveals both a physical object’s nature and location. Anyone can easily gain unauthorized access to RFID data because they don’t need a line of sight to gather it. For example, ..."
Abstract - Cited by 40 (0 self) - Add to MetaCart
has been an obvious target for abuse. Wireless identification is a powerful capability, and RFID reveals both a physical object’s nature and location. Anyone can easily gain unauthorized access to RFID data because they don’t need a line of sight to gather it. For example,

RFID security threat model

by Dale R. Thompson, Neeraj Chaudhry, Craig W. Thompson - In Proceedings Acxiom Laboratory for Applied Research (ALAR) Conf
"... Abstract: Radio Frequency Identification (RFID) technology promises benefits that accrue from being able to identify and track individual goods in commercial supply chains. This helps in inventory management, reduces theft, can be used in conjunction with other sensor technology to identify damaged ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
Abstract: Radio Frequency Identification (RFID) technology promises benefits that accrue from being able to identify and track individual goods in commercial supply chains. This helps in inventory management, reduces theft, can be used in conjunction with other sensor technology to identify damaged

RFID Security and Privacy Concerns

by S. Srinivasan, Akshai Aggarwal, Anup Kumar - WSEAS Transactions on Computer Science , 2006
"... Abstract:- Radio Frequency Identification (RFID) technology is emerging as an important tool with applications in a variety of fields. The major concern regarding RFID is the ubiquitous nature of its deployment that extends far beyond the capabilities of any of the tools available today for monitori ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
for monitoring any item without an RFID tag. Many of the applications envisioned have a legitimate use. However, this technology provides room for abuse of people’s privacy. Moreover, since the communication between a RFID tag and its reader takes place in a wireless manner, issues concerning security of such a

RFID Security Taken for Granted

by Roel Verdult, Ronny Wichers Schreur, Peter Van Rossum, Flavio D. Garcia
"... In its everyday life an average person is surrounded by RFID devices. For example when you use the access control at your office building, travelling with a public transport card, authenticate to an vehicle immobilizers that is embedded in your car key, pay for lunch with your mobile phone and readi ..."
Abstract - Add to MetaCart
In its everyday life an average person is surrounded by RFID devices. For example when you use the access control at your office building, travelling with a public transport card, authenticate to an vehicle immobilizers that is embedded in your car key, pay for lunch with your mobile phone

RFID Security and Privacy

by Prof Michel Arnaud, Ouest Nanterre Défense
"... The European Commission has published in May 2009 a recommendation “on the implementation of privacy and data protection principles in applications supported by radio-frequency identification”, which is designed to provide “guidance to Member States on the design and operation of RFID applications ..."
Abstract - Add to MetaCart
The European Commission has published in May 2009 a recommendation “on the implementation of privacy and data protection principles in applications supported by radio-frequency identification”, which is designed to provide “guidance to Member States on the design and operation of RFID applications

Desynchronization Attacks on RFID Security Protocols

by Miaolei Deng, Weijun Zhu , 2013
"... The characteristics of radio frequency identification (RFID) systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This pa ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The characteristics of radio frequency identification (RFID) systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented

RFID Security and Privacy: Threats and Countermeasures

by Marco Spruit, Wouter Wester , 2013
"... The vulnerability of Radio Frequency Identification (RFID) and the objection of consumers to buy products that include non-protected RFID are holding organizations back from investing in this promising technology. Information security and privacy are therefore important academic research areas. This ..."
Abstract - Add to MetaCart
The vulnerability of Radio Frequency Identification (RFID) and the objection of consumers to buy products that include non-protected RFID are holding organizations back from investing in this promising technology. Information security and privacy are therefore important academic research areas

Mutual Authentication in RFID Security and Privacy

by Radu-ioan Paise, Serge Vaudenay
"... In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model to protocols which offer reader authentication to tags. Whenever corruption is allowed, we prove that secure protocols ca ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model to protocols which offer reader authentication to tags. Whenever corruption is allowed, we prove that secure protocols
Next 10 →
Results 1 - 10 of 1,126
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University