Sciweavers

191 search results - page 17 / 39
» Designing with RFID
Sort
View
HCI
2007
13 years 11 months ago
RFID Cards: A New Deal for Elderly Accessibility
Elderly adults face two serious challenges bridging the digital divide. First, many suffer from physical or cognitive disabilities, which inhibit computer use. Second, the “tradi...
Robert Pastel, Charles Wallace, Jesse Heines
IPSN
2007
Springer
14 years 4 months ago
A group tour guide system with RFIDs and wireless sensor networks
This paper proposes a new application framework for group tour guiding services based on RFIDs and wireless sensor network. We consider a sensing field mixed with multiple indepe...
Po-Yu Chen, Wen Tseun Chen, Cheng Han Wu, Yu-Chee ...
NTMS
2008
IEEE
14 years 4 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
RFIDSEC
2010
13 years 8 months ago
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensu...
Gildas Avoine, Benjamin Martin 0002, Tania Martin
CHES
2008
Springer
128views Cryptology» more  CHES 2008»
14 years 2 days ago
Hash Functions and RFID Tags: Mind the Gap
Abstract. The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is ...
Andrey Bogdanov, Gregor Leander, Christof Paar, Ax...