Sciweavers

415 search results - page 5 / 83
» A New RFID Privacy Model
Sort
View
VLDB
2005
ACM
159views Database» more  VLDB 2005»
14 years 28 days ago
Temporal Management of RFID Data
RFID technology can be used to significantly improve the efficiency of business processes by providing the capability of automatic identification and data capture. This technol...
Fusheng Wang, Peiya Liu
CCS
2005
ACM
14 years 1 months ago
Untraceable RFID tags via insubvertible encryption
We introduce a new cryptographic primitive, called insubvertible encryption, that produces ciphertexts which can be randomized without the need of any key material. Unlike plain u...
Giuseppe Ateniese, Jan Camenisch, Breno de Medeiro...
CCS
2008
ACM
13 years 9 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
CIS
2006
Springer
13 years 11 months ago
Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment
The emerging ubiquitous computing is changing the current computing paradigm, and it lets the ubiquitous RFID applications consistently and independently utilize the sensed inform...
Dongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyu...
GLVLSI
2007
IEEE
162views VLSI» more  GLVLSI 2007»
14 years 1 months ago
Design of an UHF RFID transponder for secure authentication
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...