netWorker - Blog it! social software is transforming the Web<\'m>again
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
RFID: is this game of tag fair play?
Communications of the ACM - Multimodal interfaces that flex, adapt, and persist
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
BT Technology Journal
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
Some methods for privacy in RFID communication
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Protocols for RFID tag/reader authentication
Decision Support Systems
A platform for RFID security and privacy administration
LISA '06 Proceedings of the 20th conference on Large Installation System Administration
Remote Password Extraction from RFID Tags
IEEE Transactions on Computers
rfid in pervasive computing: State-of-the-art and outlook
Pervasive and Mobile Computing
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
RFID and privacy: what consumers really want and fear
Personal and Ubiquitous Computing
Rethinking RFID: awareness and control for interaction with RFID systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy enhancing technologies for RFID in retail- an empirical investigation
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
RFID privacy using spatially distributed shared secrets
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
ALGSICS: combining physics and cryptography to enhance security and privacy in RFID systems
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Physical-layer identification of UHF RFID tags
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Readers behaving badly: reader revocation in PKI-based RFID systems
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Classifying RFID attacks and defenses
Information Systems Frontiers
"Who counterfeited my Viagra?" probabilistic item removal detection via RFID tag cooperation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
On the practicality of UHF RFID fingerprinting: how real is the RFID tracking problem?
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Shoehorning security into the EPC tag standard
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Enabling secure secret updating for unidirectional key distribution in RFID-Enabled supply chains
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
User-aided reader revocation in PKI-based RFID systems
Journal of Computer Security - ESORICS 2010
Hi-index | 0.00 |
Existing solutions to protect consumer privacy in RFID either put the burden on the consumer or suffer from the very limited capabilities of today's RFID tags. We propose the use of physical RFID tag structures that permit a consumer to disable a tag by mechanically altering the tag in such a way that the ability of a reader to interrogate the RFID tag by wireless mean is inhibited. In "clipped tags", consumers can physically separate the body (chip) from the head (antenna) in an intuitive way. Such a separation provides visual confirmation that the tag has been deactivated. However, a physical contact channel may be used later to reactivate it. Such a reactivation would require deliberate actions on the part of the owner of the RFID tag to permit the reactivation to take place. Thus reactivation could not be undertaken without the owner's knowledge unless the item were either stolen or left unattended. This mechanism enables controlled reuse after purchase, making clipped tags superior to other RFID privacy-enhancing technologies.