Sciweavers

CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
14 years 4 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
14 years 4 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
PERCOM
2010
ACM
14 years 4 months ago
Negotiate power and performance in the reality of RFID systems
—Recent years have witnessed the wide adoption of the RFID technology in many important application domains including logistics, inventory, retailing, public transportation, and ...
Xunteng Xu, Lin Gu, Jianping Wang, Guoliang Xing
DUX
2007
14 years 4 months ago
180 x 120: designing alternate location systems
Using 180 RFID tags to track and plot locations over time, guests to an event at the San Francisco Museum of Modern Art (SFMOMA) collectively constructed a public visualization of...
Eric Paulos, Anthony Burke, Tom Jenkins, Karen Mar...
FC
2003
Springer
111views Cryptology» more  FC 2003»
14 years 5 months ago
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
Abstract. Thanks to their broad international acceptance and availability in high denominations, there is widespread concern that Euro banknotes may provide an attractive new curre...
Ari Juels, Ravikanth Pappu
CCS
2003
ACM
14 years 5 months ago
The blocker tag: selective blocking of RFID tags for consumer privacy
We propose the use of “selective blocking” by “blocker tags” as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or...
Ari Juels, Ronald L. Rivest, Michael Szydlo
EUC
2004
Springer
14 years 5 months ago
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags
A Radio-Frequency-Identification (RFID) tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. It emits an ID in response to a query...
Junichiro Saito, Jae-Cheol Ryou, Kouichi Sakurai
WPES
2004
ACM
14 years 5 months ago
Soft blocking: flexible blocker tags on the cheap
A “blocker” tag is a form of privacy-enhancing radio-frequency identification (RFID) tag. It operates by interfering with the protocol in which a reader communicates individua...
Ari Juels, John G. Brainard
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
14 years 5 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
FC
2005
Springer
133views Cryptology» more  FC 2005»
14 years 5 months ago
RFID Traceability: A Multilayer Problem
Abstract. RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious im...
Gildas Avoine, Philippe Oechslin