Security and privacy aspects of low-cost radio frequency identification systems
Like many technologies, low-cost Radio Frequency Identification (RFID) systems will
become pervasive in our daily lives when affixed to everyday consumer items as” smart …
become pervasive in our daily lives when affixed to everyday consumer items as” smart …
The design and analysis of graphical passwords
In this paper we propose and evaluate new graphical password schemes that exploit
features of graphical input displays to achieve better security than text-based passwords …
features of graphical input displays to achieve better security than text-based passwords …
RFID systems and security and privacy implications
Abstract The Auto-ID Center is developing low-cost radio frequency identification (RFID)
based systems with the initial application as next generation bar-codes. We describe RFID …
based systems with the initial application as next generation bar-codes. We describe RFID …
[PDF][PDF] Atomicity in electronic commerce
JD Tygar - Proceedings of the fifteenth annual ACM symposium …, 1996 - dl.acm.org
There is tremendous demand for the ability to be able to electronically buy and sell goods
over networks. This jield is called electronic commerce, and it has inspired a large variety of …
over networks. This jield is called electronic commerce, and it has inspired a large variety of …
[PDF][PDF] Security and privacy in radio-frequency identification devices
SA Weis - 2003 - dspace.mit.edu
Abstract Radio Frequency Identification (RFID) systems are a common and useful tool in
manufacturing, supply chain management and retail inventory control. Optical barcodes …
manufacturing, supply chain management and retail inventory control. Optical barcodes …
Visual authentication and identification
The problems of authentication and identification have received wide interest in
cryptographic research. However, there has been no satisfactory solution for the problem of …
cryptographic research. However, there has been no satisfactory solution for the problem of …
Picking virtual pockets using relay attacks on contactless smartcard
Z Kfir, A Wool - First International Conference on Security and …, 2005 - ieeexplore.ieee.org
A contactless smartcard is a smartcard that can communicate with other devices without any
physical connection, using Radio-Frequency Identifier (RFID) technology. Contactless …
physical connection, using Radio-Frequency Identifier (RFID) technology. Contactless …
Bootstrapping trust in commodity computers
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …
requires the user to know something about the computer's state. We examine research on …
Encryption based security system for network storage
S Plotkin, D Avida - US Patent 8,335,915, 2012 - Google Patents
The presently preferred embodiment of the invention provides an encryption based security
system for network storage that separates the ability to access storage from the ability to …
system for network storage that separates the ability to access storage from the ability to …
[PDF][PDF] Secure coprocessing applications and research issues
SW Smith - 1996 - cs.cmu.edu
The potential of secure coprocessing to address many emerging security challenges and to
enable new applications has been a long-standing interest of many members of the …
enable new applications has been a long-standing interest of many members of the …