Show simple item record

dc.contributor.authorSharif, A.
dc.contributor.authorPotdar, Vidyasagar
dc.contributor.authorChang, Elizabeth
dc.date.accessioned2017-01-30T13:26:52Z
dc.date.available2017-01-30T13:26:52Z
dc.date.created2008-11-12T23:36:16Z
dc.date.issued2008
dc.identifier.citationSharif, Atif and Potdar, Vidyasagar and Chang, Elizabeth. 2008. : A critical analysis of RFID security protocols, in Tchepnda, Christian and Paruchuri, Vamsi (ed), Advanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd IEEE International Conference on, 25 Mar 2008, pp. 1357-1362. Okinawa, Japan: IEEE.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/31691
dc.identifier.doi10.1109/WAINA.2008.212
dc.description.abstract

RFID, Radio Frequency IdentificationSystems, have gains its popularity for automated identification and supply chain applications. This paper describes the technical fundamentals of RFID systems, recent technical research on the problems of privacy/security and some security proposals are presented for this new radio technology i.e. RFID.

dc.publisherIEEE
dc.subjectRFID
dc.subjectReader
dc.subjectEncryption
dc.subjectSecurity
dc.subjectTags
dc.subjectHash Locking
dc.subjectPrivacy
dc.subjectTransponder
dc.subjectElectronic Product Code (EPC)
dc.titleA critical analysis of RFID security protocols
dc.typeConference Paper
dcterms.source.startPage1357
dcterms.source.endPage1362
dcterms.source.titleAdvanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd IEEE International Conference on
dcterms.source.seriesAdvanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd IEEE International Conference on
dcterms.source.conferenceAdvanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd IEEE International Conference on
dcterms.source.conference-start-date25 Mar 2008
dcterms.source.conferencelocationOkinawa, Japan
dcterms.source.placeJapan
curtin.note

Copyright 2008 IEEE

curtin.note

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.identifierDEL-CBS-EEB-EA-44448
curtin.identifierEPR-2893
curtin.accessStatusOpen access
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record