-
2
-
-
77951741384
-
A composite user authentication architecture for mobile devices
-
N. Clarke and S. Furnell, "A composite user authentication architecture for mobile devices," J. Information Warfare, vol. 5, no. 2, pp. 11-29, 2005.
-
(2005)
J. Information Warfare
, vol.5
, Issue.2
, pp. 11-29
-
-
Clarke, N.1
Furnell, S.2
-
3
-
-
67651160706
-
Security challenges of the EPCglobal network
-
B. Fabian and O. Günther, "Security challenges of the EPCglobal network," Commun. ACM, vol. 52, no. 7, pp. 121-125, 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.7
, pp. 121-125
-
-
Fabian, B.1
Günther, O.2
-
4
-
-
70350426491
-
The legal ramifications of microchipping people in the United States of America -A state legislative comparison
-
A. Friggieri, K. Michael, and M.G. Michael, "The legal ramifications of microchipping people in the United States of America -A state legislative comparison," in Proc. 2009 IEEE Int. Symp. Technology & Society, 2009, pp. 1-8.
-
(2009)
Proc. 2009 IEEE Int. Symp. Technology & Society
, pp. 1-8
-
-
Friggieri, A.1
Michael, K.2
Michael, M.G.3
-
5
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
DOI 10.1109/MSP.2005.78
-
S.L. Garfinkel, A. Juels, and R. Pappu, "RFID privacy: An overview of problems and proposed solutions," IEEE Security & Privacy, vol. 3, no. 3, pp. 34-43, 2005. (Pubitemid 40860471)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
6
-
-
34848849758
-
Chips, tags and scanners: Ethical challenges for radio frequency identification
-
D.J. Glasser, K.W. Goodman, and N. G. Einspruch, "Chips, tags and scanners: Ethical challenges for radio frequency identification", Ethics and Information Technology, vol. 9, no. 2, pp. 101-109, 2007.
-
(2007)
Ethics and Information Technology
, vol.9
, Issue.2
, pp. 101-109
-
-
Glasser, D.J.1
Goodman, K.W.2
Einspruch, N.G.3
-
8
-
-
77955706263
-
The impact of emerging technologies in the workplace: Who's watching the man (who's watching me)?
-
W.A. Herbert, "The impact of emerging technologies in the workplace: Who's watching the man (who's watching me)?," Hofstra Labor & Employment Law J., vol. 25, no. 2, pp. 355-393, 2008.
-
(2008)
Hofstra Labor & Employment Law J.
, vol.25
, Issue.2
, pp. 355-393
-
-
Herbert, W.A.1
-
9
-
-
67650337204
-
Legal safeguards for privacy and data protection in ambient intelligence
-
P. Hert, S. Gutwirth, A. Moscibroda, D. Wright, and G.G. Fuster, "Legal safeguards for privacy and data protection in ambient intelligence," Personal Ubiquitous Computing, vol. 13, no. 6, pp. 435-444, 2009.
-
(2009)
Personal Ubiquitous Computing
, vol.13
, Issue.6
, pp. 435-444
-
-
Hert, P.1
Gutwirth, S.2
Moscibroda, A.3
Wright, D.4
Fuster, G.G.5
-
10
-
-
65349172980
-
Open-Tag: Privacy protection for RFID
-
H. Holtzman, S. Lee, and D. Shen, "Open-Tag: Privacy protection for RFID", IEEE Pervasive Computing, vol. 8, no. 2, pp. 71-77, 2009.
-
(2009)
IEEE Pervasive Computing
, vol.8
, Issue.2
, pp. 71-77
-
-
Holtzman, H.1
Lee, S.2
Shen, D.3
-
11
-
-
33144457479
-
RFID security and privacy: A research survey
-
A. Juels, "RFID security and privacy: A research survey," IEEE J. Selected Areas Commun., vol. 24, no. 2, pp. 381-394, 2005.
-
(2005)
IEEE J. Selected Areas Commun.
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
12
-
-
67650674080
-
A survey of RFID privacy approaches
-
M. Langheinrich, "A survey of RFID privacy approaches," Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 413-421, 2009.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 413-421
-
-
Langheinrich, M.1
-
13
-
-
33845476860
-
Humancentric applications of RFID implants: The usability contexts of control, convenience and care
-
DOI 10.1109/WMCS.2005.11, 1581574, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05
-
A. Masters and K. Michael, "Humancentric applications of RFID implants: The usability contexts of control, convenience, and care," in Proc. 2nd IEEE Int. Workshop on Mobile Commerce and Services, pp. 32-41, 2005. (Pubitemid 46289950)
-
(2005)
Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05
, vol.2005
, pp. 32-41
-
-
Masters, A.1
Michael, K.2
-
14
-
-
70350374697
-
Uberveillance: Microchipping people and the assault on privacy
-
M.G. Michael and K. Michael, "Uberveillance: Microchipping people and the assault on privacy," Quadrant, vol. LIII, pp. 85-89, 2009.
-
(2009)
Quadrant
, vol.53
, pp. 85-89
-
-
Michael, M.G.1
Michael, K.2
-
15
-
-
80052870057
-
-
Office of the Privacy Commissioner of Canada, Radio Frequency Identification (RFID) in the Workplace: Recommendations for Good Practices
-
Office of the Privacy Commissioner of Canada, Radio Frequency Identification (RFID) in the Workplace: Recommendations for Good Practices. http://www.priv.gc.ca/information/pub/rfid-e.pdf.
-
-
-
-
16
-
-
25444432606
-
RFID privacy issues and technical challenges
-
DOI 10.1145/1081992.1082022
-
M. Ohkubo, K. Suzuki, and S. Kinoshita, "RFID privacy issues and technical challenges," Commun.ACM, vol. 48, no. 9, pp. 66-71, 2005. (Pubitemid 41359525)
-
(2005)
Communications of the ACM
, vol.48
, Issue.9
, pp. 66-71
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
17
-
-
23944471341
-
An ethical exploration of privacy and radio frequency identification
-
DOI 10.1007/s10551-005-2928-8
-
A.R. Peslak, "An ethical exploration of privacy and radio frequency identification," J. Business Ethics, vol. 59, no. 4, pp. 327-345, 2005. (Pubitemid 41202513)
-
(2005)
Journal of Business Ethics
, vol.59
, Issue.4
, pp. 327-345
-
-
Peslak, A.R.1
-
18
-
-
33947538532
-
Protocols for RFID tag/reader authentication
-
DOI 10.1016/j.dss.2007.01.003, PII S0167923607000103, Integrated Decision Support
-
S. Piramuthu, "Protocols for RFID tag/reader authentication," Decision Support Systems, vol. 43, no. 3, pp. 897-914, 2007. (Pubitemid 46466997)
-
(2007)
Decision Support Systems
, vol.43
, Issue.3
, pp. 897-914
-
-
Piramuthu, S.1
-
19
-
-
49249101824
-
Second-generation RFID
-
A. Razaq, W.T. Luk, K.M. Shum, L.M. Cheng, and K.N. Yung, "Second-generation RFID," IEEE Security and Privacy, vol. 6, no. 4, pp. 21-27, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.4
, pp. 21-27
-
-
Razaq, A.1
Luk, W.T.2
Shum, K.M.3
Cheng, L.M.4
Yung, K.N.5
-
20
-
-
42549157259
-
A framework for assessing RFID system security and privacy risks
-
DOI 10.1109/MPRV.2008.22, 4487091
-
P. Rotter, "A framework for assessing RFID system security and privacy risks," IEEE Pervasive Computing, vol. 7, no. 2, pp. 70-77, 2008. (Pubitemid 351575124)
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.2
, pp. 70-77
-
-
Rotter, P.1
-
21
-
-
2942623480
-
RFID systems, security and privacy implications
-
Cambridge, MA, Tech. Rep. AUTOID-WH-014
-
S. Sarma, S. Weis, and D. Engels, "RFID systems, security and privacy implications," AutoID Center, M.I.T., Cambridge, MA, Tech. Rep. AUTOID-WH-014, 2002.
-
(2002)
AutoID Center, M.I.T.
-
-
Sarma, S.1
Weis, S.2
Engels, D.3
-
22
-
-
33947499205
-
Continuous verification using multimodal biometrics
-
DOI 10.1109/TPAMI.2007.1010, Special issue on Biometrics: Progress and Directions
-
T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, "Continuous verification using multimodal biometrics," IEEE Trans.Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 687-700, 2007. (Pubitemid 46464408)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 687-700
-
-
Sim, T.1
Zhang, S.2
Janakiraman, R.3
Kumar, S.4
-
23
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
Alexandria, VA
-
B. Song and C.J. Mitchell, "RFID authentication protocol for low-cost tags," in Proc. 1st ACM Conference on Wireless Network Security, Alexandria, VA, 2008, pp. 140-147.
-
(2008)
Proc. 1st ACM Conference on Wireless Network Security
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
24
-
-
67650324012
-
RFID and privacy: What consumers really want and fear
-
S. Spiekermann. "RFID and privacy: What consumers really want and fear", Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 423-434, 2009.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 423-434
-
-
Spiekermann, S.1
-
25
-
-
67649484364
-
A gen2-based RFID authentication protocol for security and privacy
-
H.-M. Sun and W.-C. Ting, "A gen2-based RFID authentication protocol for security and privacy," IEEE Trans.Mobile Computing, vol 8, no. 8, pp. 1052-1062, 2009.
-
(2009)
IEEE Trans.Mobile Computing
, vol.8
, Issue.8
, pp. 1052-1062
-
-
Sun, H.-M.1
Ting, W.-C.2
-
27
-
-
80052895801
-
-
U.S. Department of Homeland Security, Data Privacy & Integrity Advisory Committee, The Use of RFID for Human Identify Verification, Rep. 2006-02
-
U.S. Department of Homeland Security, Data Privacy & Integrity Advisory Committee, The Use of RFID for Human Identify Verification, Rep. 2006-02; http://www.dhs.gov/xlibrary/assets/privacy/privacy-advcom-12-2006-rpt- RFID.pdf.
-
-
-
|