搜索结果: 1-12 共查到“RFID tags”相关记录12条 . 查询时间(0.068 秒)
Nowadays, RFID systems have earned an important place in our everyday lives. Its adoption is growing in areas where data security or privacy or both must be guaranteed. Since the RFID tag can be clone...
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses
RFID based supply chain clone detection authentication
2016/6/15
Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentic...
AC-DC rectifier and storage capacitors take up 25% or more of chip area for cost-sensitive passive RFID tags. In this work, we show that these components can be eliminated by utilizing a RF-only circu...
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
Authentication Yoking-Proof
2014/3/11
Peris-Lopez et al. recently provides some guidelines that should be followed to design a secure yoking-proof protocol. In addition, conforming to those guidelines and EPC C1 G2, they presented a yokin...
Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach
radio frequency identification RFID identification protocol privacy untraceability location privacy scalability
2012/3/29
In this paper, we propose a new approach to identify a tag of a RFID system in constant time while keeping untraceability to the tag. Our scheme does not use any cryptographic primitives. Instead, we ...
Grouping-Proof Protocol for RFID Tags:Security Definition and Scalable Construction
RFID Security Yoking-Proof Grouping-Proof Scalability
2009/12/29
In this paper, we propose a grouping-proof protocol
for RFID tags based on secret sharing. Our proposed
protocol addresses the scalability issue of the previous
protocols by removing the need for a...
集成传感器电子标签在农产品溯源体系中的应用(Sensors Integration in RFID Tags for Agricultural Traceability)
射频识别 电子标签 传感器
2009/11/3
实时准确获取农产品在供应链环节中的环境参数是农产品安全可追溯系统透明化的瓶颈之一。射频识别(RFID)技术可与传感器技术相结合,应用于农产品质量安全追溯系统,对温度、湿度等重要参数进行检测、记录,并通过无线通信的方式进行识别。本文综述了集成传感器电子标签的国内外发展现状,分析了技术关键点,指出了目前存在的问题以及解决问题的建议。
Current work in RFID security focuses mainly on authentication
and privacy preserving identification. In this paper,
we discuss the possibility of widening the scope of RFID
security by introducing...
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
RFID privacy pseudonym protocol cryptography
2009/3/4
The ability to link two different sightings of the same Radio
Frequency Identification (RFID) tag enables invasions of privacy. The
problem is aggravated when an item, and the tag attached to it, ch...
RFID-Tags are small devices used for identification purposes in many applications nowadays.
It is expected that they will enable many new applications and link the physical and the virtual world in t...
We describe the rst power analysis attack on passive RFID tags. Compared to
standard power analysis attacks, this attack is unique in that it requires no physical
contact with the device under atta...
In this paper, we investigate an application of RFIDs referred to in the literature as the group scanning problem, in which several tags are “simultaneously” scanned by a reader. The security context ...