RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Security Parallels between People and Pervasive Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Hi-index | 0.00 |
With the increased awareness of the potential of RFID technology across a range of applications and as a new source of information, emerges new points of attack. Due to cost issues most proposals focus on securing the RFID reader rather than the tag. This paper investigates some of the low-cost proposals for securing RFID tags from potential misuse through authentication and encryption.