Sadeghi et al., 2008 - Google Patents
User privacy in transport systems based on RFID e-ticketsSadeghi et al., 2008
View PDF- Document ID
- 18024035283456343512
- Author
- Sadeghi A
- Visconti I
- Wachsmann C
- et al.
- Publication year
- Publication venue
- PiLBA’08 Privacy in Location-Based Applications
External Links
Snippet
Recently, operators of public transportation in many countries started to roll out electronic tickets (e-tickets). E-tickets offer several advantages to transit enterprises as well as to their customers, eg, they aggravate forgeries by cryptographic means whereas customers benefit …
- 238000000034 method 0 abstract description 7
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sadeghi et al. | User privacy in transport systems based on RFID e-tickets | |
Lehtonen et al. | From identification to authentication–a review of RFID product authentication techniques | |
Pateriya et al. | The evolution of RFID security and privacy: A research survey | |
Lim et al. | Strong and robust RFID authentication enabling perfect ownership transfer | |
US8143995B2 (en) | Control of data exchange | |
CN100559393C (en) | RFID tag and its reader, reading system and security authentication method | |
Kardaş et al. | A novel RFID distance bounding protocol based on physically unclonable functions | |
Toiruul et al. | An advanced mutual-authentication algorithm using AES for RFID systems | |
Sadeghi et al. | Enhancing RFID security and privacy by physically unclonable functions | |
Dimitriou | rfidDOT: RFID delegation and ownership transfer made simple | |
Calmels et al. | Low-cost cryptography for privacy in RFID systems | |
Kim et al. | MARP: Mobile agent for RFID privacy protection | |
Spruit et al. | RFID security and privacy: threats and countermeasures | |
Dixit et al. | Comparison of various Security Protocols in RFID | |
Gandino et al. | A security protocol for RFID traceability | |
Yang et al. | A privacy model for RFID tag ownership transfer | |
Kardaş et al. | Providing resistance against server information leakage in RFID systems | |
Sadeghi et al. | Location privacy in RFID applications | |
Zhang et al. | Security Requirements for RFID Computing Systems. | |
Lee | Mutual authentication of RFID system using synchronized secret information | |
Wu et al. | RFID System Security | |
Garcia-Alfaro et al. | Security threat mitigation trends in low-cost RFID systems | |
Najera et al. | Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. | |
Shemaili et al. | Smart RFID Security, Privacy and Authentication | |
Duc et al. | A survey on RFID security and provably secure grouping-proof protocols |