Back to Results
First PageMeta Content
Technology / Surveillance / Impinj / MIFARE / Physical Unclonable Function / Cloning / Bulk reading / RuBee / Radio-frequency identification / Automatic identification and data capture / Human–computer interaction


Securing RFID systems by detecting tag cloning Mikko Lehtonen1 , Daniel Ostojic2 , Alexander Ilic1 and Florian Michahelles1 1 2
Add to Reading List

Document Date: 2009-06-23 03:52:17


Open Document

File Size: 1,47 MB

Share Result on Facebook

Company

AES / Pfizer / Case / RFID 1 Introduction Radio / MySQL / EPCglobal Inc. / Auto / /

Currency

USD / /

/

Facility

University of Fribourg / /

IndustryTerm

much weaker devices / security-sensitive applications / symmetric encryption-based tag authentication protocols / authentication server / retail industry / wireless smart card / pervasive everyday tool / public key infrastructure / user memory bank / anti-counterfeiting tool / 1A chips / product authentication technology / counterfeit products / counterfeited drug product / security products / malicious back-end systems / energy / cryptographic tag authentication protocols / reserved memory bank / reader device / stronger and better protected devices / weakest and cheapest devices / minimalistic hardware / memory bank / logistics applications / tag-to-reader authentication protocols / back-end systems / web server / law enforcement / genuine products / pharmaceutical supply chains / access control applications / using minimalistic hardware / /

MusicGroup

UHF / /

Organization

MIT / Department of Informatics / University of Fribourg / EPC / /

Person

Sanjay Sarma / /

Position

co-founder / detective / /

Product

Viagra / /

ProvinceOrState

New Brunswick / /

SportsEvent

Olympic games / /

Technology

symmetric encryption-based tag authentication protocols / public key infrastructure / Monza 1A chips / PKI / tag-to-reader authentication protocols / smart card / cloning / machine learning / mobile device / encryption / cryptography / enabling technology / automatic identification / Radio frequency / web server / cryptographic tag authentication protocols / product authentication technology / integrated circuit / /

URL

http /

SocialTag