Sciweavers

50 search results - page 2 / 10
» Secure Ownership and Ownership Transfer in RFID Systems
Sort
View
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
14 years 1 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
CN
2010
89views more  CN 2010»
13 years 7 months ago
Vulnerability analysis of RFID protocols for tag ownership transfer
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan...
APLAS
2009
ACM
14 years 2 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 7 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
OOPSLA
2007
Springer
14 years 1 months ago
Compile-time execution structure of object-oriented programs with practical ownership domain annotations
Ownership domain annotations express and enforce design intent related to object encapsulation and communication directly in real object-oriented code. First, this work will make ...
Marwan Abi-Antoun