The origins of ubiquitous computing research at PARC in the late 1980s
IBM Systems Journal
Security: for ubiquitous computing
Security: for ubiquitous computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Magic Medicine Cabinet: A Situated Portal for Consumer Healthcare
HUC '99 Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
RFID and the perception of control: the consumer's view
Communications of the ACM - Special issue: RFID
Disabling RFID tags with visible confirmation: clipped tags are silenced
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Privacy for RFID through trusted computing
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Computer
A payment & receipt business model in U-commerce environment
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Between Extreme Rejection and Cautious Acceptance
Social Science Computer Review
Managing RFID data in supply chains
International Journal of Internet Protocol Technology
Where's the beep?: security, privacy, and user misunderstandings of RFID
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
rfid in pervasive computing: State-of-the-art and outlook
Pervasive and Mobile Computing
PAP: A privacy and authentication protocol for passive RFID tags
Computer Communications
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
RFID and privacy: what consumers really want and fear
Personal and Ubiquitous Computing
Privacy enhancing technologies for RFID in retail- an empirical investigation
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
ALGSICS: combining physics and cryptography to enhance security and privacy in RFID systems
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Classifying RFID attacks and defenses
Information Systems Frontiers
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
Today's RFID protocols that govern the communication between RFID readers and tags are solely optimized for performance, but fail to address consumer privacy concerns by appropriately supporting the fair information practices. In this paper we propose a feature set that future privacy-aware RFID protocols should include in order to support the fair information principles at the lowest possible level – the air interface between readers and tags – and demonstrate that the performance impact of such an extension would be within acceptable limits. We also outline how this feature set would allow consumer interest groups and privacy-concerned individuals to judge whether an RFID reader deployment complies with the corresponding regulations through the use of a watchdog tag.