Defining strong privacy for RFID

A Juels, SA Weis - ACM Transactions on Information and System …, 2009 - dl.acm.org
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our
contribution is twofold:(i) We propose a simple, formal definition of strong privacy useful for …

An efficient and secure RFID security method with ownership transfer

K Osaka, T Takagi, K Yamazaki… - 2006 International …, 2006 - ieeexplore.ieee.org
Radio frequency identification (RFID) has come under the spotlight as technology
supporting ubiquitous society. But now, we face several security problems and challenges in …

[BOOK][B] Security in RFID and sensor networks

P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …

Efficient super-resolution and applications to mosaics

A Zomet, S Peleg - Proceedings 15th International Conference …, 2000 - ieeexplore.ieee.org
Mosaicing and super resolution are two ways to combine information from multiple frames in
video sequences. Mosaicing displays the information of multiple frames in a single …

A distributed architecture for scalable private RFID tag identification

A Solanas, J Domingo-Ferrer, A Martínez-Ballesté… - Computer Networks, 2007 - Elsevier
The fast growth of Radio Frequency IDentification (RFID) implies a deployment challenge,
namely how to keep this technology scalable without renouncing security and privacy …

Optimal key-trees for tree-based private authentication

L Buttyán, T Holczer, I Vajda - International Workshop on Privacy …, 2006 - Springer
Key-tree based private authentication has been proposed by Molnar and Wagner as a neat
way to efficiently solve the problem of privacy preserving authentication based on symmetric …

Quantifying information leakage in tree-based hash protocols (short paper)

K Nohl, D Evans - … Security: 8th International Conference, ICICS 2006 …, 2006 - Springer
Abstract Radio Frequency Identification (RFID) systems promise large scale, automated
tracking solutions but also pose a threat to customer privacy. The tree-based hash protocol …

Modeling privacy for off-line RFID systems

FD Garcia, P Van Rossum - … Conference on Smart Card Research and …, 2010 - Springer
This paper establishes a novel model for RFID schemes where readers are not continuously
connected to the back office, but only periodically. Furthermore, adversaries are not only …

Private and secure service discovery via progressive and probabilistic exposure

F Zhu, W Zhu, MW Mutka, LM Ni - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
The involvement of only the necessary users and service providers for service discovery in
pervasive computing environments is challenging. Without prudence, users' and service …

Cyclic group based mutual authentication protocol for RFID system

PK Maurya, S Bagchi - Wireless Networks, 2020 - Springer
Widespread deployment of RFID system arises security and privacy concerns of users.
There are several proposals in the literature to avoid these concerns, but most of them …