Sciweavers

339 search results - page 20 / 68
» The Evolution of RFID Security
Sort
View
COMCOM
2011
13 years 3 months ago
An RFID secure authentication mechanism in WLAN
Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Ha...
GLOBECOM
2007
IEEE
14 years 3 months ago
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme
— A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme was recently proposed as an improvement over the original authentication protocol s...
Tong-Lee Lim, Tieyan Li
HUC
2007
Springer
14 years 2 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
JTAER
2008
103views more  JTAER 2008»
13 years 8 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu
RFIDSEC
2010
13 years 6 months ago
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensu...
Gildas Avoine, Benjamin Martin 0002, Tania Martin