Separation of multiple passive RFID signals using software defined radio

D Shen, G Woo, DP Reed… - … Conference on RFID, 2009 - ieeexplore.ieee.org
We present a practical design of an RFID reader that is capable of reading multiple passive
tags through joint decoding. The reader is implemented and analyzed using the GNU …

The master key: A private authentication approach for pervasive computing environments

F Zhu, MW Mutka, LM Ni - Fourth Annual IEEE International …, 2006 - ieeexplore.ieee.org
We propose a novel entity authentication approach for pervasive computing environments. A
person uses a single device, the master key, which aggregates all his digital forms of access …

[PDF][PDF] RFID et sécurité font-elles bon ménage?

G Avoine - Conférence SSTIC, 2006 - 195-154-171-95.rev.poneytelecom …
Résumé Alors que l'identification par radiofréquence (RFID) est devenue une technologie
incontournable, de nombreuses questions se posent, tant au sujet de la sécurité que cette …

Analysis of RFID security and privacy by means of identification and authentication protocols

C Hurjui, A Graur - 2010 International Joint Conference on …, 2010 - ieeexplore.ieee.org
When analyzing the Radio Frequency Identification applications, one might think of two
essential hierarchies: the structures aiming to offer security to an RFID system and the …

[PDF][PDF] " Implementation trade-offs for access tokens

N Cognaux, E CUVELIER - dial.uclouvain.be
This thesis focusses on privacy considerations for access authentication systems. Today,
access authentication systems are used in every situations and nearly everywhere. Those …

[PDF][PDF] Design and development of a RFID reader with carrier frequency of 125 KHz

LN Cojocariu - DOCT-US, 2011 - scholar.archive.org
This paper presents the development of a low frequency Radio Frequency Identification
transceiver system aimed at providing non-contact solutions for identifying, monitoring, and …

Secure and private service discovery in pervasive computing environments

F Zhu, W Zhu - International Journal of Information Security and …, 2009 - igi-global.com
In pervasive computing environments, service discovery is an essential step for computing
devices to properly discover, configure, and communicate with each other. We introduce a …

[PDF][PDF] RFID Authentication Resistant To Compromised Readers

T Martin, PG Avoine - 2008 - Citeseer
Radio Frequency Identification (RFID) is a contactless technology used to identify or/and
authenticate remote objects or persons, through a radio frequency channel using devices …

[引用][C] La RFID et les quarante voleurs