Sciweavers

ESAS
2007
Springer
14 years 1 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...
BIOWIRE
2007
Springer
14 years 1 months ago
Field-Based Coordination for Pervasive Computing Applications
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli
APWEB
2007
Springer
14 years 1 months ago
Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags
How can a RFID (Radio Frequency Identification Devices) system prove that two or more RFID tags are in the same location? Previous researchers have proposed yoking-proof and groupi...
Chih-Chung Lin, Yuan-Cheng Lai, J. D. Tygar, Chuan...
INFOCOM
2007
IEEE
14 years 1 months ago
Anonymous Tracking Using RFID Tags
Abstract—The increasing use of RFID tags in many applications have brought forth valid concerns of privacy and anonymity among users. One of the primary concerns with RFID tags i...
Murali S. Kodialam, Thyaga Nandagopal, Wing Cheong...
ICC
2007
IEEE
214views Communications» more  ICC 2007»
14 years 1 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
ICDCS
2008
IEEE
14 years 1 months ago
How to Monitor for Missing RFID tags
As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately and effic...
Chiu Chiang Tan, Bo Sheng, Qun Li
AFRICACRYPT
2010
Springer
14 years 1 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
PERVASIVE
2009
Springer
14 years 2 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
MOBIHOC
2008
ACM
14 years 7 months ago
Finding popular categories for RFID tags
As RFID tags are increasingly attached to everyday items, it quickly becomes impractical to collect data from every tag in order to extract useful information. In this paper, we c...
Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhen Mao
MOBISYS
2008
ACM
14 years 7 months ago
Sherlock: automatically locating objects for humans
Over the course of a day a human interacts with tens or hundreds of individual objects. Many of these articles are nomadic, relying on human memory to manually index, inventory, o...
Aditya Nemmaluri, Mark D. Corner, Prashant J. Shen...