RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Keep on blockin' in the free world: personal access control for low-cost RFID tags
Proceedings of the 13th international conference on Security protocols
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A platform for RFID security and privacy administration
LISA '06 Proceedings of the 20th conference on Large Installation System Administration
Covert channels in privacy-preserving identification systems
Proceedings of the 14th ACM conference on Computer and communications security
Managing RFID data in supply chains
International Journal of Internet Protocol Technology
A cross-layer framework for privacy enhancement in RFID systems
Pervasive and Mobile Computing
rfidDOT: RFID delegation and ownership transfer made simple
Proceedings of the 4th international conference on Security and privacy in communication netowrks
eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Absence makes the heart grow fonder: new directions for implantable medical device security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
PAP: A privacy and authentication protocol for passive RFID tags
Computer Communications
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Rethinking RFID: awareness and control for interaction with RFID systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Visible and controllable RFID tags
CHI '10 Extended Abstracts on Human Factors in Computing Systems
ALGSICS: combining physics and cryptography to enhance security and privacy in RFID systems
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Classifying RFID attacks and defenses
Information Systems Frontiers
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
They can hear your heartbeats: non-invasive security for implantable medical devices
Proceedings of the ACM SIGCOMM 2011 conference
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
MARP: mobile agent for RFID privacy protection
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Shoehorning security into the EPC tag standard
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
New security problem in RFID systems “tag killing”
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Proceedings of the Designing Interactive Systems Conference
Survivability Enhancing Techniques for RFID Systems
International Journal of Handheld Computing Research
A system architecture, processor, and communication protocol for secure implants
ACM Transactions on Architecture and Code Optimization (TACO)
Hi-index | 0.00 |
RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, they will allow smart washing machines to check for incompatible clothes (e.g., white shirts and red socks) and smart refrigerators to check for milk that is too old to be consumed. Subdermal tags with medical information are already being implanted in animals and people. However, a world in which practically everything is tagged and can be read at a modest distance by anyone who wants to buy an RFID reader introduces serious security and privacy issues. For example, women walking down the street may be effectively broadcasting the sizes of their RFID-tagged bras and medical data without realizing it. To protect people in this environment, we propose developing a compact, portable, electronic device called an RFID Guardian, which people can carry with them. In the future, it could be integrated into PDAs or cell phones. The RFID Guardian looks for, records, and displays all RFID tags and scans in the vicinity, manages RFID keys, authenticates nearby RFID readers, and blocks attempted accesses to the user’s RFID tags from unauthorized readers. In this way, people can find out what RFID activity is occuring around them and take corrective action if need be.