The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
EAP methods for wireless networks
Computer Standards & Interfaces
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Information Technology and Management
RFID in retail: a framework for examining consumers' ethical perceptions
International Journal of Mobile Communications
Mutual authentication in RFID: security and privacy
Proceedings of the 2008 ACM symposium on Information, computer and communications security
The sensor internet at work: Locating everyday items using mobile phones
Pervasive and Mobile Computing
An enquiry into the ethical efficacy of the use of radio frequency identification technology
Ethics and Information Technology
RFID as a disruptive innovation
Journal of Theoretical and Applied Electronic Commerce Research
Reducing false reads in RFID-embedded supply chains
Journal of Theoretical and Applied Electronic Commerce Research
Journal of Theoretical and Applied Electronic Commerce Research
Information Systems Frontiers
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Theoretical views on the potential shopper response to RFID item tagging
International Journal of Business Information Systems
Cryptanalysis of EC-RAC, a RFID Identification Protocol
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Efficient zero-knowledge identification schemes which respect privacy
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Private Interrogation of Devices via Identification Codes
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk
International Journal of Mobile Communications
Rethinking RFID: awareness and control for interaction with RFID systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Privacy of recent RFID authentication protocols
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Traceable privacy of recent provably-secure RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
New privacy results on synchronized RFID authentication protocols against tag tracing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
Expert Systems with Applications: An International Journal
Radio frequency identification: a case for health care
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Expert Systems with Applications: An International Journal
A review of RFID technology and its managerial applications in different industries
Journal of Engineering and Technology Management
A comparative study of hardware architectures for lightweight block ciphers
Computers and Electrical Engineering
Contexts and sharing/not sharing private information
Proceedings of the 50th Annual Southeast Regional Conference
Conceptualising WiMAX user acceptance
International Journal of Business Information Systems
A holistic approach examining RFID design for security and privacy
The Journal of Supercomputing
Hi-index | 0.01 |
Cheap tags and technology simple and secure enough to ensure personal data privacy are required before retailers implement and consumers trust and confidently use them on a mass scale.