RFID and the perception of control: the consumer's view
Communications of the ACM - Special issue: RFID
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Impact of position and orientation of RFID tags on real time asset tracking in a supply chain
Journal of Theoretical and Applied Electronic Commerce Research
RFID-driven global supply chain and management
International Journal of Computer Applications in Technology
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Journal of Parallel and Distributed Computing
Security risk analysis of RFID technology: a RFID tag life cycle approach
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
Low-cost untraceable authentication protocols for RFID
Proceedings of the third ACM conference on Wireless network security
Real-time location and inpatient care systems based on passive RFID
Journal of Network and Computer Applications
The design and implementation of an intelligent deployment system for RFID readers
Expert Systems with Applications: An International Journal
Low frequency passive RFID transponder with non-revivable privacy protection circuit
IMCAS'06 Proceedings of the 5th WSEAS international conference on Instrumentation, measurement, circuits and systems
A review of RFID technology and its managerial applications in different industries
Journal of Engineering and Technology Management
A holistic approach examining RFID design for security and privacy
The Journal of Supercomputing
Hi-index | 0.00 |
With the potential to dramatically decrease costs and improve efficiency in diverse application areas ranging from asset tracking and supply chain automation to healthcare patient administration and animal tracking, RFID has become one of the fastest-growing new IT technologies. In order for businesses to recover costs, RFID tags must be inexpensive, making security infrastructure difficult to install. The public has reacted with alarm to the possibility that anyone with an RFID reader could obtain information on their purchases, finances, and travel habits, and possibly even more sensitive information such as medical records, and thus, in response, manufacturers are introducing more privacy and security features in new RFID standards.In this column we survey current and future developments in RFID security standards.