The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Soft blocking: flexible blocker tags on the cheap
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Computer
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Lend me your arms: The use and implications of humancentric RFID
Electronic Commerce Research and Applications
Protocols for RFID tag/reader authentication
Decision Support Systems
Proceedings of the 2007 ACM symposium on Applied computing
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Covert channels in privacy-preserving identification systems
Proceedings of the 14th ACM conference on Computer and communications security
A research note on ethics in the emerging age of überveillance
Computer Communications
Managing RFID data in supply chains
International Journal of Internet Protocol Technology
Impact of position and orientation of RFID tags on real time asset tracking in a supply chain
Journal of Theoretical and Applied Electronic Commerce Research
An enquiry into the ethical efficacy of the use of radio frequency identification technology
Ethics and Information Technology
RFID in the supply chain: panacea or Pandora's box?
Communications of the ACM
With anti-counterfeit ownership transfer for RFID system
ELECTROSCIENCE'08 Proceedings of the 6th WSEAS International Conference on Applied Electromagnetics, Wireless and Optical
Reducing false reads in RFID-embedded supply chains
Journal of Theoretical and Applied Electronic Commerce Research
Anti-counterfeit ownership transfer protocol for low cost RFID system
WSEAS Transactions on Computers
rfid in pervasive computing: State-of-the-art and outlook
Pervasive and Mobile Computing
RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
Information Systems Frontiers
Privacy Protection for RFID with Hidden Subset Identifiers
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Cellular automata-based authentication for low-cost RFID systems
International Journal of Communication Networks and Distributed Systems
Engineering Applications of Artificial Intelligence
RFID privacy: relation between two notions, minimal condition, and efficient construction
Proceedings of the 16th ACM conference on Computer and communications security
Security risk analysis of RFID technology: a RFID tag life cycle approach
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
Design and implementation of RFID mutual authentication protocol
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Security and privacy on low-cost Radio Frequency Identification systems
International Journal of Security and Networks
Rethinking RFID: awareness and control for interaction with RFID systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Passive attacks on a class of authentication protocols for RFID
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Efficient RFID authentication protocol for minimizing RFID tag computation
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Weaknesses in a recent ultra-lightweight RFID authentication protocol
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Untraceability of RFID protocols
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Fine-grained access control for EPC information services
IOT'08 Proceedings of the 1st international conference on The internet of things
Using RFID tags to improve pilgrimage management
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Read / write performance for low memory passive HF RFID tag-reader system
Journal of Theoretical and Applied Electronic Commerce Research
Tampering in RFID: A Survey on Risks and Defenses
Mobile Networks and Applications
Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Privacy-value-control harmonization for RFID adoption in retail
IBM Journal of Research and Development
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
A new framework for RFID privacy
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Secure and private search protocols for RFID systems
Information Systems Frontiers
Classifying RFID attacks and defenses
Information Systems Frontiers
A low-power RFID integrated circuits for intelligent healthcare systems
IEEE Transactions on Information Technology in Biomedicine
MMACTEE'09 Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering
An almost-optimal forward-private RFID mutual authentication protocol with tag control
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Comprehensive protection of RFID traceability information systems using aggregate signatures
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Across-authority lightweight ownership transfer protocol
Electronic Commerce Research and Applications
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
Implementation of terminal middleware platform for mobile RFID computing
International Journal of Ad Hoc and Ubiquitous Computing
A novel Threat Evaluation method for privacy-aware system in RFID
International Journal of Ad Hoc and Ubiquitous Computing
A review of RFID technology and its managerial applications in different industries
Journal of Engineering and Technology Management
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A scalable and untraceable authentication protocol for RFID
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
An RFID Based Multi-batch Supply Chain Systems
Wireless Personal Communications: An International Journal
On the wiretap channel induced by noisy tags
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Practical schemes for privacy and security enhanced RFID
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
mCrypton – a lightweight block cipher for security of low-cost RFID tags and sensors
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Hierarchical ECC-Based RFID authentication protocol
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Protocol for ownership transfer across authorities: with the ability to assign transfer target
Security and Communication Networks
Secure multiple group ownership transfer protocol for mobile RFID
Electronic Commerce Research and Applications
An improved authentication protocol for mobile agent device in RFID environment
International Journal of Mobile Communications
Based on mobile RFID for membership stores system conforming EPC C1G2 standards
International Journal of Ad Hoc and Ubiquitous Computing
Security Risks Associated with Radio Frequency Identification in Medical Environments
Journal of Medical Systems
An Ownership Transfer Scheme Using Mobile RFIDs
Wireless Personal Communications: An International Journal
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
A holistic approach examining RFID design for security and privacy
The Journal of Supercomputing
Security analysis of LMAP using AVISPA
International Journal of Security and Networks
A zero-knowledge based framework for RFID privacy
Journal of Computer Security - ESORICS 2010
Design of a secure RFID authentication scheme preceding market transactions
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.02 |
As organizations aggressively deploy Radio Frequency Identification systems, activists are increasingly concerned about RFID's potential to invade user privacy. This overview highlights potential threats and how they might be addressed using both technology and public policy.