Zhang et al., 2008 - Google Patents
Security Requirements for RFID Computing Systems.Zhang et al., 2008
View PDF- Document ID
- 14470288880571138292
- Author
- Zhang X
- King B
- Publication year
- Publication venue
- Int. J. Netw. Secur.
External Links
Snippet
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Often the model was introduced by the creator of the protocol, in some cases borrowing …
- 238000004891 communication 0 description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups, e.g. automatic card files incorporating conveying and reading operations
- G06K2017/0035—Aspects not covered by other subgroups
- G06K2017/0045—Tracking objects or persons
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mitrokotsa et al. | Classifying RFID attacks and defenses | |
Park et al. | Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment | |
Heydt-Benjamin et al. | Privacy for public transportation | |
US8143995B2 (en) | Control of data exchange | |
Lehtonen et al. | From identification to authentication–a review of RFID product authentication techniques | |
Bhargav-Spantzel et al. | Privacy preserving multi-factor authentication with biometrics | |
Mitrokotsa et al. | Classification of RFID attacks | |
US20060282681A1 (en) | Cryptographic configuration control | |
Sadeghi et al. | User privacy in transport systems based on RFID e-tickets | |
Dimitriou | rfidDOT: RFID delegation and ownership transfer made simple | |
JP2005148982A (en) | User authentication method, user information acquisition device, authentication server device, user information acquisition device program, and authentication server device program | |
Rong et al. | RFID security | |
Kim et al. | MARP: Mobile agent for RFID privacy protection | |
Zhang et al. | Security Requirements for RFID Computing Systems. | |
Mahinderjit-Singh et al. | Trust in RFID-enabled supply-chain management | |
Karger | Privacy and security threat analysis of the federal employee personal identity verification (PIV) program | |
Zhang et al. | An anti-counterfeiting RFID privacy protection protocol | |
Zhang et al. | Modeling RFID security | |
Sadeghi et al. | Location privacy in RFID applications | |
Deswarte et al. | A Proposal for a Privacy-preserving National Identity Card. | |
Deswarte et al. | The challenges raised by the privacy-preserving identity card | |
Kiat et al. | Analysis of OPACITY and PLAID Protocols for Contactless Smart Cards | |
Molnar | Security and privacy in two RFID deployments, with new methods for private authentication and RFID pseudonyms | |
Park et al. | Attribute-based access control using combined authentication technologies | |
Liang | Security and performance analysis for rfid protocols |