Security and privacy aspects of low-cost radio frequency identification systems

SA Weis, SE Sarma, RL Rivest, DW Engels - Security in Pervasive …, 2004 - Springer
Like many technologies, low-cost Radio Frequency Identification (RFID) systems will
become pervasive in our daily lives when affixed to everyday consumer items as” smart …

The design and analysis of graphical passwords

I Jermyn, A Mayer, F Monrose, MK Reiter… - 8th USENIX Security …, 1999 - usenix.org
In this paper we propose and evaluate new graphical password schemes that exploit
features of graphical input displays to achieve better security than text-based passwords …

RFID systems and security and privacy implications

SE Sarma, SA Weis, DW Engels - International workshop on cryptographic …, 2002 - Springer
Abstract The Auto-ID Center is developing low-cost radio frequency identification (RFID)
based systems with the initial application as next generation bar-codes. We describe RFID …

[PDF][PDF] Atomicity in electronic commerce

JD Tygar - Proceedings of the fifteenth annual ACM symposium …, 1996 - dl.acm.org
There is tremendous demand for the ability to be able to electronically buy and sell goods
over networks. This jield is called electronic commerce, and it has inspired a large variety of …

[PDF][PDF] Security and privacy in radio-frequency identification devices

SA Weis - 2003 - dspace.mit.edu
Abstract Radio Frequency Identification (RFID) systems are a common and useful tool in
manufacturing, supply chain management and retail inventory control. Optical barcodes …

Visual authentication and identification

M Naor, B Pinkas - Advances in Cryptology—CRYPTO'97: 17th Annual …, 1997 - Springer
The problems of authentication and identification have received wide interest in
cryptographic research. However, there has been no satisfactory solution for the problem of …

Picking virtual pockets using relay attacks on contactless smartcard

Z Kfir, A Wool - First International Conference on Security and …, 2005 - ieeexplore.ieee.org
A contactless smartcard is a smartcard that can communicate with other devices without any
physical connection, using Radio-Frequency Identifier (RFID) technology. Contactless …

Bootstrapping trust in commodity computers

B Parno, JM McCune, A Perrig - 2010 IEEE Symposium on …, 2010 - ieeexplore.ieee.org
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

Encryption based security system for network storage

S Plotkin, D Avida - US Patent 8,335,915, 2012 - Google Patents
The presently preferred embodiment of the invention provides an encryption based security
system for network storage that separates the ability to access storage from the ability to …

[PDF][PDF] Secure coprocessing applications and research issues

SW Smith - 1996 - cs.cmu.edu
The potential of secure coprocessing to address many emerging security challenges and to
enable new applications has been a long-standing interest of many members of the …