Shih et al., 2005 - Google Patents
Privacy and security aspects of RFID tagsShih et al., 2005
View PDF- Document ID
- 10454791695711278775
- Author
- Shih D
- Lin C
- Lin B
- Publication year
- Publication venue
- Soutwest Region Decision Sciences Institute
External Links
Snippet
ABSTRACT RFID has recently received a lot of attention as an augmentation technology in manufacturing, SCM and retail inventory control. However, widespread deployment of RFID tags may create new threats to security and privacy of individuals and organizations. This …
- 238000005516 engineering process 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Molnar et al. | Privacy and security in library RFID: Issues, practices, and architectures | |
Juels | RFID security and privacy: A research survey | |
Garfinkel et al. | RFID privacy: An overview of problems and proposed solutions | |
Weis et al. | Security and privacy aspects of low-cost radio frequency identification systems | |
Juels | Strengthening EPC tags against cloning | |
Juels et al. | High-power proxies for enhancing RFID privacy and utility | |
US8143995B2 (en) | Control of data exchange | |
Lehtonen et al. | Securing RFID systems by detecting tag cloning | |
Damghani et al. | Investigating attacks to improve security and privacy in RFID systems using the security bit method | |
Shih et al. | RFID tags: privacy and security aspects | |
Garcia-Alfaro et al. | Security and privacy concerns about the RFID layer of EPC Gen2 networks | |
Kim et al. | MARP: Mobile agent for RFID privacy protection | |
Rong et al. | RFID security | |
Spruit et al. | RFID security and privacy: threats and countermeasures | |
Shih et al. | Privacy and security aspects of RFID tags | |
Johansson | An Introduction to RFID–Information Security and Privacy Concerns | |
An et al. | RFID system for user's privacy protection | |
المهدي عبدالسلام عجال et al. | Networked Radio Frequency identification Systems Security and Privacy Issues | |
Sklavos et al. | RFID security: Threats and solutions | |
KR100618316B1 (en) | Rfid authentication system and its method | |
Nájera et al. | RFID: Technological issues and privacy concerns | |
Dimitriou | RFID security and privacy | |
Zhang et al. | An improved RFID privacy protection scheme based on Hash-chain | |
Jalandhar et al. | Security and Privacy Issues of RFID | |
Liu et al. | Rfidguard: a lightweight privacy and authentication protocol for passive rfid tags |