Back to Results
First PageMeta Content
Technology / Surveillance / Biometric passport / Auto-ID Labs / Optical RFID / Singulation / Radio-frequency identification / Automatic identification and data capture / Human–computer interaction


Classification of RFID Attacks Aikaterini Mitrokotsa, Melanie R. Rieback and Andrew S. Tanenbaum Department of Computer Science, Vrije Universiteit
Add to Reading List

Document Date: 2008-08-27 18:36:25


Open Document

File Size: 766,66 KB

Share Result on Facebook

Company

Oracle / /

Currency

USD / /

/

IndustryTerm

non-critical applications / wireless nature / challenge response authentication protocols / wireless channels / middleware server / purpose networking devices / adversarial device / high energy waves / physical devices / possible available solutions / exponential solution / middleware systems / distance bounding protocol / pervasive computing technologies / insecure and unused network protocols / web protocols / secure operating systems / devices / back-end infrastructure / static electricity / record communications / middleware applications / even noncryptographic solutions / authentication protocols / alternative solution / isolating the RFID middleware server / /

Organization

EPC / United Nations / Andrew S. Tanenbaum Department of Computer Science / Center for Democracy and Technology / KILL Command / /

Person

Melanie R. Rieback / Andrew S. Tanenbaum / /

Position

privacy officer and a legal counsel / researcher / /

Product

SQL injection / /

ProgrammingLanguage

SQL / XML / PHP / Javascript / /

Technology

4.3 Network Protocol / encryption / symmetric key encryption / challenge response authentication protocols / XML / PHP / authentication protocols / using authentication protocols / Radio Frequency / cloning / insecure and unused network protocols / weak authentication protocols / operating system / distance bounding protocol / pervasive computing technologies / operating systems / RFID technology / integrated circuits / web protocols / business intelligence / network protocols / public key encryption / /

SocialTag