Sciweavers

339 search results - page 9 / 68
» The Evolution of RFID Security
Sort
View
ACISP
2009
Springer
14 years 3 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson
PERCOM
2009
ACM
14 years 3 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
PET
2005
Springer
14 years 2 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 8 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 8 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King