Untangling RFID Privacy Models
The rise of wireless applications based on RFID has brought up major concerns on privacy. Indeed nowadays, when such an application is deployed, informed customers yearn for guarantees that their privacy will not be threatened. One formal way to perform this task is to assess the privacy level of th...
Saved in:
| Main Authors: | Iwen Coisel, Tania Martin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2013-01-01
|
| Series: | Journal of Computer Networks and Communications |
| Online Access: | http://dx.doi.org/10.1155/2013/710275 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Analyzing the Privacy of a Healthcare RFID Authentication Protocol
by: Anca-Maria Nica, et al.
Published: (2024-11-01) -
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
by: Li Lu, et al.
Published: (2012-05-01) -
Untangling the Constitutional Labyrinth
by: Rabindra Kr Pathak
Published: (2010-01-01) -
Untangling Magellanic Streams
by: Dennis Zaritsky, et al.
Published: (2025-02-01) -
Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud
by: Qingkuan Dong, et al.
Published: (2015-10-01)