Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Security model for Intra-Domain Mobility Management Protocol
International Journal of Mobile Communications
Wireless trust: conceptual and operational definition
International Journal of Mobile Communications
International Journal of Mobile Communications
Mobile communications and mobile services
International Journal of Mobile Communications
Overcoming barriers to the successful adoption of mobile commerce in Singapore
International Journal of Mobile Communications
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
The state of RFID for effective baggage tracking in the airline industry
International Journal of Mobile Communications
User characteristics and performance with automated mobile phone systems
International Journal of Mobile Communications
RFID in retail: a framework for examining consumers' ethical perceptions
International Journal of Mobile Communications
An efficient Web Services-enabled Architecture for Radio Frequency Identification Environment
International Journal of Mobile Communications
An architecture for agent-based mobile Supply Chain Event Management
International Journal of Mobile Communications
Is TAM for wireless mobile data services applicable in China? A survey report from Zhejiang, China
International Journal of Mobile Communications
International Journal of Mobile Communications
Project-WLAN: a longitudinal study of WLAN experiments
International Journal of Mobile Communications
Enhanced monitoring of tuberculosis patients by using RFID technologies
International Journal of Mobile Communications
Understanding the key success factors of RFID use in Supply Chain Management: a Delphi study
International Journal of Mobile Communications
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Hi-index | 0.00 |
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in manufacturing, SCM, and retail inventory control. However, widespread deployment of RFID tags may create new threats to security and privacy of individuals and organisations. This paper gives an overview of all types of RFID privacy and security problems and its countermeasures.