Sciweavers

1790 search results - page 3 / 358
» On Privacy Models for RFID
Sort
View
FC
2005
Springer
133views Cryptology» more  FC 2005»
14 years 4 months ago
RFID Traceability: A Multilayer Problem
Abstract. RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious im...
Gildas Avoine, Philippe Oechslin
SEC
2008
14 years 9 days ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans
CARDIS
2010
Springer
159views Hardware» more  CARDIS 2010»
14 years 2 months ago
Modeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only ...
Flavio D. Garcia, Peter van Rossum
ASIACRYPT
2007
Springer
14 years 5 months ago
On Privacy Models for RFID
Serge Vaudenay
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 11 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King