Sciweavers

841 search results - page 23 / 169
» RFIDs and Personal Privacy
Sort
View
COSIT
2005
Springer
95views GIS» more  COSIT 2005»
14 years 2 months ago
Simulation of Obfuscation and Negotiation for Location Privacy
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
Matt Duckham, Lars Kulik
ESORICS
2009
Springer
14 years 3 months ago
Untraceable Tags Based on Mild Assumptions
Radio frequency identification (RFID) chips have been widely deployed in large-scale systems such as inventory control and supply chain management. While RFID technology has much...
Carlo Blundo, Angelo De Caro, Giuseppe Persiano
UM
2005
Springer
14 years 2 months ago
Constraint-Sensitive Privacy Management for Personalized Web-Based Systems
This research aims at reconciling web personalization with privacy constraints imposed by legal restrictions and by users’ privacy preferences. We propose a software product line...
Yang Wang 0005
RFIDSEC
2010
13 years 7 months ago
Strong Authentication and Strong Integrity (SASI) Is Not That Strong
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming proba...
Gildas Avoine, Xavier Carpent, Benjamin Martin 000...
MOBISYS
2008
ACM
14 years 8 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...