## Abstract When an RFID tag is used in the whole item lifecycle including a consumer scene or a recycle scene, we have to protect consumer privacy in the state that the RFID tag is stuck on an item. We use the lowβcost RFID tag that has the access control function using a password, and we propose
β¦ LIBER β¦
A survey of RFID privacy approaches
β Scribed by Marc Langheinrich
- Publisher
- Springer
- Year
- 2008
- Tongue
- English
- Weight
- 301 KB
- Volume
- 13
- Category
- Article
- ISSN
- 1617-4909
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Group management of RFID passwords for p
β
Yuichi Kobayashi; Toshiyuki Kuwana; Yoji Taniguchi; Norihisa Komoda
π
Article
π
2009
π
Wiley (John Wiley & Sons)
π
English
β 601 KB
A survey of computational location priva
β
John Krumm
π
Article
π
2008
π
Springer
π
English
β 233 KB
Protecting Your Privacy with a Mobile Ag
β
Sang-Soo Yeo; Soo-Cheol Kim; Sung Kwon Kim; Gilcheol Park; Seok Soo Kim; Ki-Sung
π
Article
π
2008
π
Springer US
π
English
β 402 KB
Privacy Analysis of Forward and Backward
β
Raphael C.-W. Phan; Jiang Wu; Khaled Ouafi; Douglas R. Stinson
π
Article
π
2010
π
Springer US
π
English
β 497 KB
Privacy in Criminal Investigations β A S
β
Bert-Jaap Koops; Anton Vedder
π
Article
π
2002
π
Elsevier Science
π
English
β 94 KB
Governmental authorities should have the power to infringe the privacy of citizens in order to investigate crime. That opinion is prevailing and uncontroversial in most Western countries. Less articulate and more controversial in these societies, however, are ideas about the extent to which the auth
Patient privacy: A consumer protection a
β
Vincent M. Brannigan
π
Article
π
1984
π
Springer US
π
English
β 362 KB