메뉴 건너뛰기




Volumn 30, Issue 3, 2011, Pages 34-41

Continuous RFID-enabled authentication: Privacy implications

Author keywords

[No Author keywords available]

Indexed keywords

AMUSEMENT PARKS; APPLICATION AREA; CRITICAL RESPONSE; LAW ENFORCEMENT PERSONNEL; MEDICAL PERSONNEL; RADIO FREQUENCY IDENTIFICATION TECHNOLOGY;

EID: 80052906222     PISSN: 02780097     EISSN: None     Source Type: Journal    
DOI: 10.1109/MTS.2011.942306     Document Type: Article
Times cited : (13)

References (27)
  • 2
    • 77951741384 scopus 로고    scopus 로고
    • A composite user authentication architecture for mobile devices
    • N. Clarke and S. Furnell, "A composite user authentication architecture for mobile devices," J. Information Warfare, vol. 5, no. 2, pp. 11-29, 2005.
    • (2005) J. Information Warfare , vol.5 , Issue.2 , pp. 11-29
    • Clarke, N.1    Furnell, S.2
  • 3
    • 67651160706 scopus 로고    scopus 로고
    • Security challenges of the EPCglobal network
    • B. Fabian and O. Günther, "Security challenges of the EPCglobal network," Commun. ACM, vol. 52, no. 7, pp. 121-125, 2009.
    • (2009) Commun. ACM , vol.52 , Issue.7 , pp. 121-125
    • Fabian, B.1    Günther, O.2
  • 4
    • 70350426491 scopus 로고    scopus 로고
    • The legal ramifications of microchipping people in the United States of America -A state legislative comparison
    • A. Friggieri, K. Michael, and M.G. Michael, "The legal ramifications of microchipping people in the United States of America -A state legislative comparison," in Proc. 2009 IEEE Int. Symp. Technology & Society, 2009, pp. 1-8.
    • (2009) Proc. 2009 IEEE Int. Symp. Technology & Society , pp. 1-8
    • Friggieri, A.1    Michael, K.2    Michael, M.G.3
  • 5
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • DOI 10.1109/MSP.2005.78
    • S.L. Garfinkel, A. Juels, and R. Pappu, "RFID privacy: An overview of problems and proposed solutions," IEEE Security & Privacy, vol. 3, no. 3, pp. 34-43, 2005. (Pubitemid 40860471)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 6
    • 34848849758 scopus 로고    scopus 로고
    • Chips, tags and scanners: Ethical challenges for radio frequency identification
    • D.J. Glasser, K.W. Goodman, and N. G. Einspruch, "Chips, tags and scanners: Ethical challenges for radio frequency identification", Ethics and Information Technology, vol. 9, no. 2, pp. 101-109, 2007.
    • (2007) Ethics and Information Technology , vol.9 , Issue.2 , pp. 101-109
    • Glasser, D.J.1    Goodman, K.W.2    Einspruch, N.G.3
  • 8
    • 77955706263 scopus 로고    scopus 로고
    • The impact of emerging technologies in the workplace: Who's watching the man (who's watching me)?
    • W.A. Herbert, "The impact of emerging technologies in the workplace: Who's watching the man (who's watching me)?," Hofstra Labor & Employment Law J., vol. 25, no. 2, pp. 355-393, 2008.
    • (2008) Hofstra Labor & Employment Law J. , vol.25 , Issue.2 , pp. 355-393
    • Herbert, W.A.1
  • 10
    • 65349172980 scopus 로고    scopus 로고
    • Open-Tag: Privacy protection for RFID
    • H. Holtzman, S. Lee, and D. Shen, "Open-Tag: Privacy protection for RFID", IEEE Pervasive Computing, vol. 8, no. 2, pp. 71-77, 2009.
    • (2009) IEEE Pervasive Computing , vol.8 , Issue.2 , pp. 71-77
    • Holtzman, H.1    Lee, S.2    Shen, D.3
  • 11
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • A. Juels, "RFID security and privacy: A research survey," IEEE J. Selected Areas Commun., vol. 24, no. 2, pp. 381-394, 2005.
    • (2005) IEEE J. Selected Areas Commun. , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 12
    • 67650674080 scopus 로고    scopus 로고
    • A survey of RFID privacy approaches
    • M. Langheinrich, "A survey of RFID privacy approaches," Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 413-421, 2009.
    • (2009) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 413-421
    • Langheinrich, M.1
  • 13
    • 33845476860 scopus 로고    scopus 로고
    • Humancentric applications of RFID implants: The usability contexts of control, convenience and care
    • DOI 10.1109/WMCS.2005.11, 1581574, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05
    • A. Masters and K. Michael, "Humancentric applications of RFID implants: The usability contexts of control, convenience, and care," in Proc. 2nd IEEE Int. Workshop on Mobile Commerce and Services, pp. 32-41, 2005. (Pubitemid 46289950)
    • (2005) Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05 , vol.2005 , pp. 32-41
    • Masters, A.1    Michael, K.2
  • 14
    • 70350374697 scopus 로고    scopus 로고
    • Uberveillance: Microchipping people and the assault on privacy
    • M.G. Michael and K. Michael, "Uberveillance: Microchipping people and the assault on privacy," Quadrant, vol. LIII, pp. 85-89, 2009.
    • (2009) Quadrant , vol.53 , pp. 85-89
    • Michael, M.G.1    Michael, K.2
  • 15
    • 80052870057 scopus 로고    scopus 로고
    • Office of the Privacy Commissioner of Canada, Radio Frequency Identification (RFID) in the Workplace: Recommendations for Good Practices
    • Office of the Privacy Commissioner of Canada, Radio Frequency Identification (RFID) in the Workplace: Recommendations for Good Practices. http://www.priv.gc.ca/information/pub/rfid-e.pdf.
  • 16
    • 25444432606 scopus 로고    scopus 로고
    • RFID privacy issues and technical challenges
    • DOI 10.1145/1081992.1082022
    • M. Ohkubo, K. Suzuki, and S. Kinoshita, "RFID privacy issues and technical challenges," Commun.ACM, vol. 48, no. 9, pp. 66-71, 2005. (Pubitemid 41359525)
    • (2005) Communications of the ACM , vol.48 , Issue.9 , pp. 66-71
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 17
    • 23944471341 scopus 로고    scopus 로고
    • An ethical exploration of privacy and radio frequency identification
    • DOI 10.1007/s10551-005-2928-8
    • A.R. Peslak, "An ethical exploration of privacy and radio frequency identification," J. Business Ethics, vol. 59, no. 4, pp. 327-345, 2005. (Pubitemid 41202513)
    • (2005) Journal of Business Ethics , vol.59 , Issue.4 , pp. 327-345
    • Peslak, A.R.1
  • 18
    • 33947538532 scopus 로고    scopus 로고
    • Protocols for RFID tag/reader authentication
    • DOI 10.1016/j.dss.2007.01.003, PII S0167923607000103, Integrated Decision Support
    • S. Piramuthu, "Protocols for RFID tag/reader authentication," Decision Support Systems, vol. 43, no. 3, pp. 897-914, 2007. (Pubitemid 46466997)
    • (2007) Decision Support Systems , vol.43 , Issue.3 , pp. 897-914
    • Piramuthu, S.1
  • 20
    • 42549157259 scopus 로고    scopus 로고
    • A framework for assessing RFID system security and privacy risks
    • DOI 10.1109/MPRV.2008.22, 4487091
    • P. Rotter, "A framework for assessing RFID system security and privacy risks," IEEE Pervasive Computing, vol. 7, no. 2, pp. 70-77, 2008. (Pubitemid 351575124)
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.2 , pp. 70-77
    • Rotter, P.1
  • 21
    • 2942623480 scopus 로고    scopus 로고
    • RFID systems, security and privacy implications
    • Cambridge, MA, Tech. Rep. AUTOID-WH-014
    • S. Sarma, S. Weis, and D. Engels, "RFID systems, security and privacy implications," AutoID Center, M.I.T., Cambridge, MA, Tech. Rep. AUTOID-WH-014, 2002.
    • (2002) AutoID Center, M.I.T.
    • Sarma, S.1    Weis, S.2    Engels, D.3
  • 24
    • 67650324012 scopus 로고    scopus 로고
    • RFID and privacy: What consumers really want and fear
    • S. Spiekermann. "RFID and privacy: What consumers really want and fear", Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 423-434, 2009.
    • (2009) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 423-434
    • Spiekermann, S.1
  • 25
    • 67649484364 scopus 로고    scopus 로고
    • A gen2-based RFID authentication protocol for security and privacy
    • H.-M. Sun and W.-C. Ting, "A gen2-based RFID authentication protocol for security and privacy," IEEE Trans.Mobile Computing, vol 8, no. 8, pp. 1052-1062, 2009.
    • (2009) IEEE Trans.Mobile Computing , vol.8 , Issue.8 , pp. 1052-1062
    • Sun, H.-M.1    Ting, W.-C.2
  • 27
    • 80052895801 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security, Data Privacy & Integrity Advisory Committee, The Use of RFID for Human Identify Verification, Rep. 2006-02
    • U.S. Department of Homeland Security, Data Privacy & Integrity Advisory Committee, The Use of RFID for Human Identify Verification, Rep. 2006-02; http://www.dhs.gov/xlibrary/assets/privacy/privacy-advcom-12-2006-rpt- RFID.pdf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.