[go: up one dir, main page]

Zhang et al., 2008 - Google Patents

Security Requirements for RFID Computing Systems.

Zhang et al., 2008

View PDF
Document ID
14470288880571138292
Author
Zhang X
King B
Publication year
Publication venue
Int. J. Netw. Secur.

External Links

Snippet

Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Often the model was introduced by the creator of the protocol, in some cases borrowing …
Continue reading at ijns.jalaxy.com.tw (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups, e.g. automatic card files incorporating conveying and reading operations
    • G06K2017/0035Aspects not covered by other subgroups
    • G06K2017/0045Tracking objects or persons

Similar Documents

Publication Publication Date Title
Mitrokotsa et al. Classifying RFID attacks and defenses
Park et al. Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment
Heydt-Benjamin et al. Privacy for public transportation
US8143995B2 (en) Control of data exchange
Lehtonen et al. From identification to authentication–a review of RFID product authentication techniques
Bhargav-Spantzel et al. Privacy preserving multi-factor authentication with biometrics
Mitrokotsa et al. Classification of RFID attacks
US20060282681A1 (en) Cryptographic configuration control
Sadeghi et al. User privacy in transport systems based on RFID e-tickets
Dimitriou rfidDOT: RFID delegation and ownership transfer made simple
JP2005148982A (en) User authentication method, user information acquisition device, authentication server device, user information acquisition device program, and authentication server device program
Rong et al. RFID security
Kim et al. MARP: Mobile agent for RFID privacy protection
Zhang et al. Security Requirements for RFID Computing Systems.
Mahinderjit-Singh et al. Trust in RFID-enabled supply-chain management
Karger Privacy and security threat analysis of the federal employee personal identity verification (PIV) program
Zhang et al. An anti-counterfeiting RFID privacy protection protocol
Zhang et al. Modeling RFID security
Sadeghi et al. Location privacy in RFID applications
Deswarte et al. A Proposal for a Privacy-preserving National Identity Card.
Deswarte et al. The challenges raised by the privacy-preserving identity card
Kiat et al. Analysis of OPACITY and PLAID Protocols for Contactless Smart Cards
Molnar Security and privacy in two RFID deployments, with new methods for private authentication and RFID pseudonyms
Park et al. Attribute-based access control using combined authentication technologies
Liang Security and performance analysis for rfid protocols