Mobile learning combined with RFID for technical and vocational education and training
Proceedings of the 3rd international conference on Mobile multimedia communications
Modeling privacy compromise: visibility of individuals via DRM and RFID in ubiquitous computing
Proceedings of the 2008 Spring simulation multiconference
RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
A ubiquitous mobile telemedicine system for the elderly using RFID
International Journal of Security and Networks
Privacy-value-control harmonization for RFID adoption in retail
IBM Journal of Research and Development
Controlled delegation protocol in mobile RFID networks
EURASIP Journal on Wireless Communications and Networking
Across-authority lightweight ownership transfer protocol
Electronic Commerce Research and Applications
Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I
Implementation of terminal middleware platform for mobile RFID computing
International Journal of Ad Hoc and Ubiquitous Computing
A novel Threat Evaluation method for privacy-aware system in RFID
International Journal of Ad Hoc and Ubiquitous Computing
Protocol for ownership transfer across authorities: with the ability to assign transfer target
Security and Communication Networks
An extensible system for enhancing social conference experience
PSI'11 Proceedings of the 8th international conference on Perspectives of System Informatics
Secure multiple group ownership transfer protocol for mobile RFID
Electronic Commerce Research and Applications
Information systems for enhancing social experience in a conference context: A sensor based approach
Programming and Computing Software
Hi-index | 0.00 |
Radio Frequency Identification (RFID) technology that is used to identify objects and users and automatically takes advantage of contextual information such as user's location is expected to become an important and a core technology of ubiquitous infrastructure. This technology has been applied to many applications such as retail and supply chain. At recent, there are an increasing number of researches related to mobile RFID that provides RFID service to user with a reader embedded in the mobile device as the one of RFID applications. However, there are an increasing number of concerns, and even some resistance, related to user tracking and profiling using RFID technology. Therefore, in this paper, we review privacy threats that have been reported in various RFID applications and bring up some additional privacy threats in mobile RFID, impeding the deployment of mobile RFID. And we analyze whether various privacy protecting measures that have been proposed to address privacy problems in RFID can also apply to mobile RFID.