Sciweavers

841 search results - page 22 / 169
» RFIDs and Personal Privacy
Sort
View
GRC
2007
IEEE
14 years 3 months ago
Privacy in the Information and Communications Technologies
— Information and Communications Technologies (ICT) are fostering the appearance of a plethora of new services and applications. On the one hand, ICT will improve the efficiency...
Antoni Martínez-Ballesté, Agusti Sol...
JTAER
2008
103views more  JTAER 2008»
13 years 8 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu
CTRSA
2008
Springer
110views Cryptology» more  CTRSA 2008»
13 years 10 months ago
RFID Security: Tradeoffs between Security and Efficiency
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
Ivan Damgård, Michael Østergaard Pede...
MOBICOM
2010
ACM
13 years 9 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun