Sciweavers

96 search results - page 13 / 20
» Privacy preserving on Radio Frequency Identification systems
Sort
View
ARCS
2006
Springer
14 years 11 days ago
Prototypical Implementation of Location-Aware Services Based on Super-Distributed RFID Tags
Abstract. We provide evidence of the feasibility and effectiveness of a middleware architecture for mobile devices which employs dense distributions of small computerized entities ...
Jürgen Bohn
IJNVO
2007
72views more  IJNVO 2007»
13 years 8 months ago
RFID as enabler for the boundless real-time organisation: empirical insights from Germany
: Radio Frequency Identification (RFID) is currently considered a hot topic in the IT arena. It is described as a major enabling technology for automated contactless wireless data ...
Jan Marco Leimeister, Uta Franziska Knebel, Helmut...
PERCOM
2006
ACM
14 years 8 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
PERCOM
2005
ACM
14 years 8 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
PET
2004
Springer
14 years 1 months ago
Electromagnetic Eavesdropping Risks of Flat-Panel Displays
Electromagnetic eavesdropping of computer displays – first demonstrated to the general public by van Eck in 1985 – is not restricted to cathode-ray tubes. Modern flat-panel d...
Markus G. Kuhn