Separation of multiple passive RFID signals using software defined radio
D Shen, G Woo, DP Reed… - … Conference on RFID, 2009 - ieeexplore.ieee.org
We present a practical design of an RFID reader that is capable of reading multiple passive
tags through joint decoding. The reader is implemented and analyzed using the GNU …
tags through joint decoding. The reader is implemented and analyzed using the GNU …
The master key: A private authentication approach for pervasive computing environments
We propose a novel entity authentication approach for pervasive computing environments. A
person uses a single device, the master key, which aggregates all his digital forms of access …
person uses a single device, the master key, which aggregates all his digital forms of access …
[PDF][PDF] RFID et sécurité font-elles bon ménage?
G Avoine - Conférence SSTIC, 2006 - 195-154-171-95.rev.poneytelecom …
Résumé Alors que l'identification par radiofréquence (RFID) est devenue une technologie
incontournable, de nombreuses questions se posent, tant au sujet de la sécurité que cette …
incontournable, de nombreuses questions se posent, tant au sujet de la sécurité que cette …
Analysis of RFID security and privacy by means of identification and authentication protocols
C Hurjui, A Graur - 2010 International Joint Conference on …, 2010 - ieeexplore.ieee.org
When analyzing the Radio Frequency Identification applications, one might think of two
essential hierarchies: the structures aiming to offer security to an RFID system and the …
essential hierarchies: the structures aiming to offer security to an RFID system and the …
[PDF][PDF] " Implementation trade-offs for access tokens
N Cognaux, E CUVELIER - dial.uclouvain.be
This thesis focusses on privacy considerations for access authentication systems. Today,
access authentication systems are used in every situations and nearly everywhere. Those …
access authentication systems are used in every situations and nearly everywhere. Those …
[PDF][PDF] Design and development of a RFID reader with carrier frequency of 125 KHz
LN Cojocariu - DOCT-US, 2011 - scholar.archive.org
This paper presents the development of a low frequency Radio Frequency Identification
transceiver system aimed at providing non-contact solutions for identifying, monitoring, and …
transceiver system aimed at providing non-contact solutions for identifying, monitoring, and …
Secure and private service discovery in pervasive computing environments
F Zhu, W Zhu - International Journal of Information Security and …, 2009 - igi-global.com
In pervasive computing environments, service discovery is an essential step for computing
devices to properly discover, configure, and communicate with each other. We introduce a …
devices to properly discover, configure, and communicate with each other. We introduce a …
[PDF][PDF] RFID Authentication Resistant To Compromised Readers
T Martin, PG Avoine - 2008 - Citeseer
Radio Frequency Identification (RFID) is a contactless technology used to identify or/and
authenticate remote objects or persons, through a radio frequency channel using devices …
authenticate remote objects or persons, through a radio frequency channel using devices …