File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/ICEBE.2006.49
- Scopus: eid_2-s2.0-38649093940
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Experimental analysis of an RFID security protocol
Title | Experimental analysis of an RFID security protocol |
---|---|
Authors | |
Keywords | RFID applications Sensor systems System security |
Issue Date | 2006 |
Publisher | IEEE. |
Citation | Proceedings - Ieee International Conference On E-Business Engineering, Icebe 2006, 2006, p. 62-69 How to Cite? |
Abstract | Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications. © 2006 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/109114 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Luo, Z | en_HK |
dc.contributor.author | Chan, T | en_HK |
dc.contributor.author | Li, JS | en_HK |
dc.contributor.author | Wong, E | en_HK |
dc.contributor.author | Cheung, W | en_HK |
dc.contributor.author | Ng, V | en_HK |
dc.contributor.author | Fok, W | en_HK |
dc.date.accessioned | 2010-09-26T01:08:37Z | - |
dc.date.available | 2010-09-26T01:08:37Z | - |
dc.date.issued | 2006 | en_HK |
dc.identifier.citation | Proceedings - Ieee International Conference On E-Business Engineering, Icebe 2006, 2006, p. 62-69 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/109114 | - |
dc.description.abstract | Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications. © 2006 IEEE. | en_HK |
dc.language | eng | en_HK |
dc.publisher | IEEE. | en_HK |
dc.relation.ispartof | Proceedings - IEEE International Conference on e-Business Engineering, ICEBE 2006 | en_HK |
dc.rights | ©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | en_HK |
dc.subject | RFID applications | en_HK |
dc.subject | Sensor systems | en_HK |
dc.subject | System security | en_HK |
dc.title | Experimental analysis of an RFID security protocol | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Fok, W:wtfok@eee.hku.hk | en_HK |
dc.identifier.authority | Fok, W=rp00116 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/ICEBE.2006.49 | en_HK |
dc.identifier.scopus | eid_2-s2.0-38649093940 | en_HK |
dc.identifier.hkuros | 144378 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-38649093940&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.spage | 62 | en_HK |
dc.identifier.epage | 69 | en_HK |
dc.identifier.scopusauthorid | Luo, Z=22433447600 | en_HK |
dc.identifier.scopusauthorid | Chan, T=15519263900 | en_HK |
dc.identifier.scopusauthorid | Li, JS=7410077876 | en_HK |
dc.identifier.scopusauthorid | Wong, E=23480883400 | en_HK |
dc.identifier.scopusauthorid | Cheung, W=7202742782 | en_HK |
dc.identifier.scopusauthorid | Ng, V=36859875600 | en_HK |
dc.identifier.scopusauthorid | Fok, W=24824510700 | en_HK |