Protocols for RFID tag/reader authentication
Decision Support Systems
RFID, privacy and the perception of risk: A strategic framework
The Journal of Strategic Information Systems
Supporting document management by using RFID technology
International Journal of Internet Protocol Technology
Secured tag identification using EDSA (enhanced distributed scalable architecture)
Proceedings of the 2008 ACM symposium on Applied computing
rfid in pervasive computing: State-of-the-art and outlook
Pervasive and Mobile Computing
RFID survivability quantification and attack modeling
Proceedings of the third ACM conference on Wireless network security
Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Data diodes in support of trustworthy cyber infrastructure
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Classifying RFID attacks and defenses
Information Systems Frontiers
An agent based back-end RFID tag management system
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
New mobile payment protocol: mobile pay center protocol (MPCP)
ISPACT'10 Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy
Real-time location and inpatient care systems based on passive RFID
Journal of Network and Computer Applications
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Security issues of a phasor data concentrator for smart grid infrastructure
EWDC '11 Proceedings of the 13th European Workshop on Dependable Computing
Is RFID technology secure and private?
Proceedings of the 2011 Information Security Curriculum Development Conference
SP'11 Proceedings of the 19th international conference on Security Protocols
A privacy-restoring mechanism for offline RFID systems
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
SP 800-98. Guidelines for Securing Radio Frequency Identification (RFID) Systems
SP 800-98. Guidelines for Securing Radio Frequency Identification (RFID) Systems
Security Risks Associated with Radio Frequency Identification in Medical Environments
Journal of Medical Systems
An Evaluation of the RFID Security Benefits of the APF System: Hospital Patient Data Protection
International Journal of Advanced Pervasive and Ubiquitous Computing
Hi-index | 0.01 |
One of the challenges in pervasive computing is communication between a mobile user's terminal and the continuously changing local environment. Bluetooth is one potential option for providing connectivity, but its usage is hindered by the time consuming ...