[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Thompson et al., 2006 - Google Patents

RFID security threat model

Thompson et al., 2006

View PDF
Document ID
3978157993476364318
Author
Thompson D
Chaudhry N
Thompson C
et al.
Publication year
Publication venue
Conf. on Applied Research in Information Technology

External Links

Snippet

Radio Frequency Identification (RFID) technology promises benefits that accrue from being able to identify and track individual goods in commercial supply chains. This helps in inventory management, reduces theft, can be used in conjunction with other sensor …
Continue reading at netgeekdr.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07758Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag

Similar Documents

Publication Publication Date Title
Thompson et al. RFID security threat model
Juels Strengthening EPC tags against cloning
Thornton et al. RFID security
KR100842270B1 (en) Electric tag for privacy protection and method for privacy protection using the electric tag
Engberg et al. Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience.
Langheinrich RFID and privacy
Kulkarni et al. RFID security issues & challenges
Xiao et al. RFID technology, security vulnerabilities, and countermeasures
Song et al. The RFID middleware system supporting context-aware access control service
Kurkovsky et al. Continuous RFID-enabled authentication: Privacy implications
Johansson An Introduction to RFID–Information Security and Privacy Concerns
Hennig et al. Privacy enhancing technology concepts for RFID technology scrutinised
Khast Overview of radio frequency identification: security issues and suggesting a solution
Kazakov et al. TYPOLOGY OF RISKS IN RFID: TYPOLOGY OF RISKS IN RFID
Kurkovsky et al. Continuous RFID-enabled authentication and its privacy implications
Huang An overview of RFID technology, application, and security/privacy threats and solutions
Shih et al. Privacy and security aspects of RFID tags
Thompson et al. Categorizing RFID privacy threats with STRIDE
Renegar et al. The RFID value proposition
Singh et al. Radio frequency identification: applications and security issues
المهدي عبدالسلام عجال et al. Networked Radio Frequency identification Systems Security and Privacy Issues
Zhang et al. An improved RFID privacy protection scheme based on Hash-chain
Di et al. Security for RFID tags
Sklavos et al. RFID security: Threats and solutions
Xia et al. A privacy protection protocol for RFID-enabled supply chain system