Thompson et al., 2006 - Google Patents
RFID security threat modelThompson et al., 2006
View PDF- Document ID
- 3978157993476364318
- Author
- Thompson D
- Chaudhry N
- Thompson C
- et al.
- Publication year
- Publication venue
- Conf. on Applied Research in Information Technology
External Links
Snippet
Radio Frequency Identification (RFID) technology promises benefits that accrue from being able to identify and track individual goods in commercial supply chains. This helps in inventory management, reduces theft, can be used in conjunction with other sensor …
- 238000005516 engineering process 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07749—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
- G06K19/07758—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thompson et al. | RFID security threat model | |
Juels | Strengthening EPC tags against cloning | |
Thornton et al. | RFID security | |
KR100842270B1 (en) | Electric tag for privacy protection and method for privacy protection using the electric tag | |
Engberg et al. | Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. | |
Langheinrich | RFID and privacy | |
Kulkarni et al. | RFID security issues & challenges | |
Xiao et al. | RFID technology, security vulnerabilities, and countermeasures | |
Song et al. | The RFID middleware system supporting context-aware access control service | |
Kurkovsky et al. | Continuous RFID-enabled authentication: Privacy implications | |
Johansson | An Introduction to RFID–Information Security and Privacy Concerns | |
Hennig et al. | Privacy enhancing technology concepts for RFID technology scrutinised | |
Khast | Overview of radio frequency identification: security issues and suggesting a solution | |
Kazakov et al. | TYPOLOGY OF RISKS IN RFID: TYPOLOGY OF RISKS IN RFID | |
Kurkovsky et al. | Continuous RFID-enabled authentication and its privacy implications | |
Huang | An overview of RFID technology, application, and security/privacy threats and solutions | |
Shih et al. | Privacy and security aspects of RFID tags | |
Thompson et al. | Categorizing RFID privacy threats with STRIDE | |
Renegar et al. | The RFID value proposition | |
Singh et al. | Radio frequency identification: applications and security issues | |
المهدي عبدالسلام عجال et al. | Networked Radio Frequency identification Systems Security and Privacy Issues | |
Zhang et al. | An improved RFID privacy protection scheme based on Hash-chain | |
Di et al. | Security for RFID tags | |
Sklavos et al. | RFID security: Threats and solutions | |
Xia et al. | A privacy protection protocol for RFID-enabled supply chain system |