Sciweavers

JCM
2008
138views more  JCM 2008»
13 years 11 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
UCS
2004
Springer
14 years 4 months ago
Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols
Today’s RFID protocols that govern the communication between RFID readers and tags are solely optimized for performance, but fail to address consumer privacy concerns by support...
Christian Floerkemeier, Roland Schneider, Marc Lan...
WPES
2005
ACM
14 years 5 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
INFOCOM
2007
IEEE
14 years 5 months ago
RFID-Based 3-D Positioning Schemes
Abstract— This research focuses on RFID-based 3-D positioning schemes, aiming to locate an object in a 3-dimensional space, with reference to a predetermined arbitrary coordinate...
Chong Wang, Hongyi Wu, Nian-Feng Tzeng
WIMOB
2008
IEEE
14 years 5 months ago
A Multi-Sensing-Range Method for Position Estimation of Passive RFID Tags
— Recently, the RFID tag system is paid attention to as an identification source. Each RFID tag is attached to some object. With the unique ID of RFID tag, a user identifies the ...
Toshihiro Hori, Tomotaka Wada, Yuuki Ota, Norie Uc...
PERCOM
2007
ACM
14 years 11 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...