Sciweavers

92 search results - page 10 / 19
» A Secure RFID Authentication Protocol with Low Communication...
Sort
View
CCS
2007
ACM
14 years 2 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
ICCCN
2008
IEEE
14 years 3 months ago
Multi-Hop RFID Wake-Up Radio: Design, Evaluation and Energy Tradeoffs
Abstract—Energy efficiency is a central challenge in batteryoperated sensor networks. Current energy-efficient mechanisms employ either duty cycling, which reduces idle listeni...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
IPSN
2007
Springer
14 years 2 months ago
A group tour guide system with RFIDs and wireless sensor networks
This paper proposes a new application framework for group tour guiding services based on RFIDs and wireless sensor network. We consider a sensing field mixed with multiple indepe...
Po-Yu Chen, Wen Tseun Chen, Cheng Han Wu, Yu-Chee ...
JCP
2006
120views more  JCP 2006»
13 years 8 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
ACSAC
2003
IEEE
14 years 1 months ago
S-ARP: a Secure Address Resolution Protocol
Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the Address Resolution P...
Danilo Bruschi, A. Ornaghi, Emilia Rosti