[go: up one dir, main page]

Mitrokotsa et al., 2010 - Google Patents

Classifying RFID attacks and defenses

Mitrokotsa et al., 2010

View HTML
Document ID
4831133226028932591
Author
Mitrokotsa A
Rieback M
Tanenbaum A
Publication year
Publication venue
Information Systems Frontiers

External Links

Snippet

Abstract RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10297Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Mitrokotsa et al. Classifying RFID attacks and defenses
Mitrokotsa et al. Classification of RFID attacks
Juels RFID security and privacy: A research survey
Heydt-Benjamin et al. Privacy for public transportation
Juels RFID security and privacy: A research survey
Bhadani Comprehensive Survey of Threats, Cyberattacks, and Enhanced Countermeasures in RFID Technology
Alizadeh et al. A survey on attacks in RFID networks
Abdulghani et al. Analysis on security and privacy guidelines: RFID-based IoT applications
Peris-Lopez et al. Attacking RFID systems
Rong et al. RFID security
Stajano Security issues in ubiquitous computing
Mubarak et al. A critical review on RFID system towards security, trust, and privacy (STP)
Kim et al. MARP: Mobile agent for RFID privacy protection
Spruit et al. RFID security and privacy: threats and countermeasures
Mahinderjit-Singh et al. Trust in RFID-enabled supply-chain management
Mitrokotsa et al. Classification of RFID Threats based on Security Principles
Zhang et al. Security Requirements for RFID Computing Systems.
Soppera et al. Wireless identification—privacy and security
Singh et al. Various Attacks and their Countermeasure on all Layers of RFID System
Gautam et al. Enhancing Radio Frequency Identification Systems Security using KLEIN algorithm
Mitrokotsa et al. Threats to networked RFID systems
Kim et al. A research on issues related to RFID security and privacy
Rotter Security and privacy in RFID applications
Ranasinghe et al. Security in low cost RFID
Liang Security and performance analysis for rfid protocols