Bridging physical and virtual worlds with electronic tags
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Designing for Ubiquity: The Perception of Privacy
IEEE Pervasive Computing
Queue - RFID
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Battery-free Wireless Identification and Sensing
IEEE Pervasive Computing
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
RFID-based techniques for human-activity detection
Communications of the ACM - Special issue: RFID
RFID privacy issues and technical challenges
Communications of the ACM - Special issue: RFID
RFID and the perception of control: the consumer's view
Communications of the ACM - Special issue: RFID
What does RFID do for the consumer?
Communications of the ACM - Special issue: RFID
Disabling RFID tags with visible confirmation: clipped tags are silenced
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Security and Privacy Issues in E-passports
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Some sensor network elements for ubiquitous computing
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Information Technology and Management
Where's the beep?: security, privacy, and user misunderstandings of RFID
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
An empirical investigation of concerns of everyday tracking and recording technologies
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Proceedings of the 15th ACM conference on Computer and communications security
RFID sensor networks with the Intel WISP
Proceedings of the 6th ACM conference on Embedded network sensor systems
Proceedings of the 3rd International Conference on Tangible and Embedded Interaction
Critical RFID Privacy-Enhancing Technologies
Computing in Science and Engineering
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Vulnerabilities in first-generation RFID-enabled credit cards
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
RFID guardian: a battery-powered mobile device for RFID privacy management
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Some methods for privacy in RFID communication
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Intersecting the architecture of the internet of things with the future retail industry
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Radio frequency identification (RFID) projects for computer science
Journal of Computing Sciences in Colleges
Inspirational bits: towards a shared understanding of the digital material
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Internet of things: a review of literature and products
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
Hi-index | 0.01 |
People now routinely carry radio frequency identification (RFID) tags - in passports, driver's licenses, credit cards, and other identifying cards - from which nearby RFID readers can access privacy-sensitive information. The problem is that people are often unaware of security and privacy risks associated with RFID, likely because the technology remains largely invisible and uncontrollable for the individual. To mitigate this problem, we introduce a collection of novel yet simple and inexpensive tag designs. Our tags provide reader awareness, where people get visual, audible, or tactile feedback as tags come into the range of RFID readers. Our tags also provide information control, where people can allow or disallow access to the information stored on the tag by how they touch, orient, move, press or illuminate the tag.