RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Patient information display system in hospital using RFID
Proceedings of the 2009 International Conference on Hybrid Information Technology
Multilateral approaches to the mobile RFID security problem using web service
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Secure RFID application data management using all-or-nothing transform encryption
WASA'10 Proceedings of the 5th international conference on Wireless algorithms, systems, and applications
AONT encryption based application data management in mobile RFID environment
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part II
Harmful adult multimedia contents filtering method in mobile RFID service environment
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part II
Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I
Implementation of terminal middleware platform for mobile RFID computing
International Journal of Ad Hoc and Ubiquitous Computing
Security analysis and implementation leveraging globally networked RFIDs
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Security techniques based on EPC gen2 tag for secure mobile RFID network services
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Secure RFID personal data management using privacy reference profile
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
A study on the secure home healthcare wireless service
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Information technology security evaluation using CERT c secure coding standard
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
USN middleware access control of sensor network and selective encryption of information
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Based on mobile RFID for membership stores system conforming EPC C1G2 standards
International Journal of Ad Hoc and Ubiquitous Computing
Certification tools of ubiquitous mobile platform
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
An Ownership Transfer Scheme Using Mobile RFIDs
Wireless Personal Communications: An International Journal
Design of a secure RFID authentication scheme preceding market transactions
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |
Recently, RFID (Radio Frequency Identification) technology is practically applied to a number of logistics processes as well as asset management, and RFID is also expected to be permeated in our daily life with the name of ’Ubiquitous Computing’ or ‘Ubiquitous Network’ within the near future. The R&D groups in global now have paid attention to integrate RFID with mobile devices as well as to associate with the existing mobile telecommunication network. Such a converged technology and services would lead to make new markets and research challenges. However, the privacy violation on tagged products has become stumbling block. We propose light-weight security mechanism which is constructed by mobile RFID security mechanism based on WIPI (Wireless Internet Platform for Interoperability). WIPI-based light-weight mobile RFID security platform can be applicable to various mobile RFID services that required secure business applications in mobile environment.