Mitrokotsa et al., 2010 - Google Patents
Classifying RFID attacks and defensesMitrokotsa et al., 2010
View HTML- Document ID
- 4831133226028932591
- Author
- Mitrokotsa A
- Rieback M
- Tanenbaum A
- Publication year
- Publication venue
- Information Systems Frontiers
External Links
Snippet
Abstract RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad …
- 238000004891 communication 0 abstract description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10297—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mitrokotsa et al. | Classifying RFID attacks and defenses | |
Mitrokotsa et al. | Classification of RFID attacks | |
Juels | RFID security and privacy: A research survey | |
Heydt-Benjamin et al. | Privacy for public transportation | |
Juels | RFID security and privacy: A research survey | |
Bhadani | Comprehensive Survey of Threats, Cyberattacks, and Enhanced Countermeasures in RFID Technology | |
Alizadeh et al. | A survey on attacks in RFID networks | |
Abdulghani et al. | Analysis on security and privacy guidelines: RFID-based IoT applications | |
Peris-Lopez et al. | Attacking RFID systems | |
Rong et al. | RFID security | |
Stajano | Security issues in ubiquitous computing | |
Mubarak et al. | A critical review on RFID system towards security, trust, and privacy (STP) | |
Kim et al. | MARP: Mobile agent for RFID privacy protection | |
Spruit et al. | RFID security and privacy: threats and countermeasures | |
Mahinderjit-Singh et al. | Trust in RFID-enabled supply-chain management | |
Mitrokotsa et al. | Classification of RFID Threats based on Security Principles | |
Zhang et al. | Security Requirements for RFID Computing Systems. | |
Soppera et al. | Wireless identification—privacy and security | |
Singh et al. | Various Attacks and their Countermeasure on all Layers of RFID System | |
Gautam et al. | Enhancing Radio Frequency Identification Systems Security using KLEIN algorithm | |
Mitrokotsa et al. | Threats to networked RFID systems | |
Kim et al. | A research on issues related to RFID security and privacy | |
Rotter | Security and privacy in RFID applications | |
Ranasinghe et al. | Security in low cost RFID | |
Liang | Security and performance analysis for rfid protocols |