Sciweavers

897 search results - page 12 / 180
» Security Requirements for RFID Computing Systems
Sort
View
ICC
2007
IEEE
214views Communications» more  ICC 2007»
14 years 2 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
LCN
2008
IEEE
14 years 2 months ago
Optimal distance-based clustering for tag anti-collision in RFID systems
—Tag collisions can impose a major delay in Radio Frequency IDentification (RFID) systems. Such collisions are hard to overcome with passive tags due to their limited capabiliti...
Waleed Alsalih, Kashif Ali, Hossam S. Hassanein
IJACT
2008
136views more  IJACT 2008»
13 years 8 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
IEEEARES
2007
IEEE
14 years 2 months ago
Towards Secure E-Elections in Turkey: Requirements and Principles
E-democracy is a necessity in this era of computers and information technology. E-voting is one of the most significant parts of e-democracy, which refers to the use of computers ...
Orhan Cetinkaya, Deniz Cetinkaya
CARDIS
2008
Springer
153views Hardware» more  CARDIS 2008»
13 years 10 months ago
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents
In recent years more and more security sensitive applications use passive smart devices such as contactless smart cards and RFID tags. Cost constraints imply a small hardware footp...
Carsten Rolfes, Axel Poschmann, Gregor Leander, Ch...