Sciweavers

897 search results - page 3 / 180
» Security Requirements for RFID Computing Systems
Sort
View
IWRT
2008
109views Communications» more  IWRT 2008»
13 years 9 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
GLOBECOM
2006
IEEE
14 years 2 months ago
A Lightweight Secure Solution for RFID
— Radio Frequency Identification (RFID) systems have provided promising solutions to effective identification of a large number of tagged objects. However, RFID systems suffer ...
Bo Sun, Chung-Chih Li, Yang Xiao
INDOCRYPT
2010
Springer
13 years 5 months ago
Getting a Few Things Right and Many Things Wrong
: Radio frequency identification (RFID) is a technology for the automated identification of physical entities using radio frequency transmissions. In the past ten years, RFID syste...
Neal Koblitz
ETFA
2008
IEEE
14 years 2 months ago
A secure agent platform for active RFID
RFID are used to identify products in factory automation applications; Multi agent systems are a possibility to introduce flexibility into production processes. This article intro...
Albert Treytl, Werner Spenger, Bilal Riaz
CSCWD
2009
Springer
13 years 11 months ago
Privacy preserving on Radio Frequency Identification systems
This paper focuses on the challenges on the privacy of Radio Frequency Identification (RFID) systems. RFID systems have already widely applied in industry and have been bringing l...
Hua Wang, Lili Sun, Jianming Yong, Yongbing Zhang