Pervasive Computing Goes the Last 100 Feet with RFID Systems
IEEE Pervasive Computing
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
Trust and Radio Frequency Identification (RFID) Adoption within an Alliance
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 07
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Adaptive binary splitting for a RFID tag collision arbitration via multi-agent systems
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Hi-index | 0.00 |
Radio frequency identification (RFID) systems based on low-cost computing devices are small, inexpensive microchips capable of transmitting unique identifiers wirelessly, which make it dramatically increases the ability of the organization to acquire a vast array of data about the location and properties of any entity that can be physically tagged and wirelessly scanned within certain technical limitations. However, its security has been a major project to be focused on for RFID systems. In this paper the “tree-based” technique will be carefully investigated and a multi-tree group method is first discussed and the outcomes of investigations suggest that the overall probability that the whole attack succeeds is sharply dropped.