[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sadeghi et al., 2008 - Google Patents

User privacy in transport systems based on RFID e-tickets

Sadeghi et al., 2008

View PDF
Document ID
18024035283456343512
Author
Sadeghi A
Visconti I
Wachsmann C
et al.
Publication year
Publication venue
PiLBA’08 Privacy in Location-Based Applications

External Links

Snippet

Recently, operators of public transportation in many countries started to roll out electronic tickets (e-tickets). E-tickets offer several advantages to transit enterprises as well as to their customers, eg, they aggravate forgeries by cryptographic means whereas customers benefit …
Continue reading at air.unimi.it (PDF) (other versions)

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Similar Documents

Publication Publication Date Title
Sadeghi et al. User privacy in transport systems based on RFID e-tickets
Lehtonen et al. From identification to authentication–a review of RFID product authentication techniques
Pateriya et al. The evolution of RFID security and privacy: A research survey
Lim et al. Strong and robust RFID authentication enabling perfect ownership transfer
US8143995B2 (en) Control of data exchange
CN100559393C (en) RFID tag and its reader, reading system and security authentication method
Kardaş et al. A novel RFID distance bounding protocol based on physically unclonable functions
Toiruul et al. An advanced mutual-authentication algorithm using AES for RFID systems
Sadeghi et al. Enhancing RFID security and privacy by physically unclonable functions
Dimitriou rfidDOT: RFID delegation and ownership transfer made simple
Calmels et al. Low-cost cryptography for privacy in RFID systems
Kim et al. MARP: Mobile agent for RFID privacy protection
Spruit et al. RFID security and privacy: threats and countermeasures
Dixit et al. Comparison of various Security Protocols in RFID
Gandino et al. A security protocol for RFID traceability
Yang et al. A privacy model for RFID tag ownership transfer
Kardaş et al. Providing resistance against server information leakage in RFID systems
Sadeghi et al. Location privacy in RFID applications
Zhang et al. Security Requirements for RFID Computing Systems.
Lee Mutual authentication of RFID system using synchronized secret information
Wu et al. RFID System Security
Garcia-Alfaro et al. Security threat mitigation trends in low-cost RFID systems
Najera et al. Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents.
Shemaili et al. Smart RFID Security, Privacy and Authentication
Duc et al. A survey on RFID security and provably secure grouping-proof protocols