4,305 Hits in 3.6 sec

A Survey of RFID Authentication Protocols Based on Hash-Chain Method [article]

Irfan Syamsuddin, Tharam Dillon, Elizabeth Chang, Song Han
2010 arXiv   pre-print
Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication.  ...  Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems.  ...  RFID Security and Privacy Schema To get a clear understanding on how those security and privacy issues exist within RFID technology, a schema introduced in [17] is presented. Garkenfield,  ... 
arXiv:1008.2452v1 fatcat:apyxrib2efh3bm722phuizym44

Review on security issues in RFID systems

Mohamed El Beqqal, Mostafa Azizi
2017 Advances in Science, Technology and Engineering Systems  
In this paper, we review some of the recent research works using RFID solutions and dealing with security and privacy issues, we define our specific parameters and requirements allowing us to classify  ...  Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems.  ...  The Section 2 summarizes the basics components of an RFID system, some examples of applications and a summarized review on most challenges and research directions where we concentrate on the problem of  ... 
doi:10.25046/aj020624 fatcat:letskv4rencurmxjxp32hblvrm

RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations

Parks Rachida, Chu Chao-Hsien, Xu Heng
2010 Journal of Information Privacy and Security  
This paper reviews and analyzes the impact of privacy issues in the RFID adoption in the healthcare domain, and presents a conceptual framework for analyzing the relationship between technology and regulations  ...  With the deployment and use of Radio Frequency Identification (RFID) technology in the healthcare domain, there are increasing privacy concerns regarding the technical designs of RFID systems vis-à-vis  ...  Chuleeporn Changchit (Editor-in-Chief: JIPS), the associate editor and three anonymous reviewers for their constructive comments on improving this paper.  ... 
doi:10.1080/15536548.2010.10855891 fatcat:nythvxwezbg7zgjq7kvik5zffi

RFID Applications and Adoptions in Healthcare: A Review on Patient Safety

Moutaz Haddara, Anna Staaby
2018 Procedia Computer Science  
Through a literature review, this paper attempts to explore the challenges of RFID adoption in healthcare, with a focus on patient safety.  ...  Our main findings suggest that high costs of adoption, concerns related to security and privacy, and human safety risks are the main barriers for adoption.  ...  In order to address the focus question and cover relevant publications, the authors conducted a literature review on central topics including RFID technology, RFID adoption, and RFID applications within  ... 
doi:10.1016/j.procs.2018.10.012 pmid:32288898 pmcid:PMC7129262 fatcat:4lhlvfwskvchhkvtd2nbmkjytu

Consumer Acceptance of RFID Technology: An Exploratory Study

Muhammad Muazzem Hossain, Victor R. Prybutok
2008 IEEE transactions on engineering management  
The research model proposes that convenience, culture, privacy, regulation, and security are the principal factors influencing the consumers' acceptance of RFID.  ...  Radio Frequency Identification (RFID) technology is used in numerous applications and offers a plethora of interesting potential new applications.  ...  The research model presented in this study is based on an extensive review of prior literature on the acceptance of RFID technology.  ... 
doi:10.1109/tem.2008.919728 fatcat:b7sqmkpjdjck7gv2w52ibt4mtq

The Role of RFID Technology in Supply Chain Risk Management [chapter]

May Tajima
2011 Designing and Deploying RFID Applications  
Within the literature, numerous articles have discussed RFID-enabled supply chain visibility as a source of security and privacy risks.  ...  Section 2 provides a review of the background literature.  ...  Radio Frequency Identification (RFID), a method of remotely storing and receiving data using devices called RFID tags, brings many real business benefits to today world's organizations.  ... 
doi:10.5772/18253 fatcat:xqgf7pozcnethb6fdnvu74w54i

A Survey on Low-cost RFID Authentication Protocols [article]

Irfan Syamsuddin, Song Han, Vidyasagar Potdar, Tharam Dillon
2012 arXiv   pre-print
This paper presents a survey on several RFID authentication protocols under low cost restrictions. Low cost RFID are mainly addressed with limited security and privacy protections.  ...  This study provides a new insight in RFID literature which can be used particularly by small and medium industries to choose the appropriate RFID protocol for their needs.  ...  The comparative study is emphasized on three assessments related to security and privacy. The three assessments are data protection, tracking prevention, and forward security.  ... 
arXiv:1009.3626v2 fatcat:ti3ir5ke45hrbdwbaw6j7t2mbu

Design And Evaluation Of Auto-Id Enabled Shopping Assistance Artifacts In Customers' Mobile Phones: Two Retail Store Laboratory Experiments

John Aloysius, Hartmut Hoehle, Viswanath Venkatesh, Scot Burton
2017 Zenodo  
(RFID) reader—and content design—product information versus product review versus both.  ...  and reviews.  ...  Eric Ngai, the senior editor, for his comments and advice on the manuscript. The authors also thank the associate editor and reviewers for their guidance.  ... 
doi:10.5281/zenodo.897199 fatcat:gbv4k23o5fb6bhubhqj7nmj6dy

How do libraries manage the ethical and privacy issues of RFID implementation? A qualitative investigation into the decision-making processes of ten libraries

Stuart Ferguson, Clare Thornley, Forbes Gibb
2014 Journal of Librarianship and Information Science  
The research methodology consisted of a literature review, theme identification, interview scheduling, interviews and interview analysis.  ...  Findings covered the main drivers of RFID development, perceived benefits, tag data, data security, levels of 2 ethical concern, public consultation, potential impact of technological developments on ethical  ...  Acknowledgements With thanks to all the libraries that agreed to participate in this research project and to Shane McLouglin of the Department of Library and Information Studies at University College Dublin  ... 
doi:10.1177/0961000613518572 fatcat:67t2zc3myjhklpt3vlqf43gemu

RFID Technology in Libraries: A Review of Literature of Indian Perspective

Parul Gupta, Margam Madhusudhan
2016 DESIDOC Journal of Library & Information Technology  
It is hoped that the present study will help Librarians and Library professionals in improving the return on investment and proving the long-term security of the library.  ...  literature covering the concerned libraries of India.  ...  The aim of the paper is to present the descriptive literature reviews (the abstract section of the source papers) and integrative literature reviews (reference the conclusion) on different facets of RFID  ... 
doi:10.14429/djlit.37.1.10772 fatcat:u5men6vhg5ebjapmaz2gvzulii

A Summary of the Special Issue "Cybersecurity and Cryptography"

Qiong Huang, Guomin Yang
2015 Information  
Data security is a crucial factor to the success of new information technologies and infrastructures, such as Cloud Computing and Big Data.  ...  Nowadays in the cyber world, massive amounts of data are being collected, transmitted, and stored by different organizations and individuals.  ...  Acknowledgements We thank all the authors and reviewers of this Special Issue as well as the editorial staff of the MDPI Information Journal in making this Special Issue a success.  ... 
doi:10.3390/info6040833 fatcat:dedlaxpdejeq5nqf6mkejy54z4

Exploring the Perceived Measures of Privacy: RFID in Public Applications

Mohammad Alamgir Hossain
2014 Australasian Journal of Information Systems  
The findings show that, in developed and developing countries, the basic perceptions of the users on privacy protection are complimentary; however, privacy is a more serious concern in Australia than in  ...  status, and the perceptions and tolerance of the citizens on privacy issues are different in the stated regions.  ...  For a detail review on privacy literature, see Bélanger & Crossler (2011) and Pavlou (2011); a brief is presented in Table 1 .  ... 
doi:10.3127/ajis.v18i2.835 fatcat:wmolxz3ebfe7tl27q3mmbdbm6i

A systematic review of RFID applications and diffusion: key areas and public policy issues

Kwangho Jung, Sabinne Lee
2015 Journal of Open Innovation: Technology, Market and Complexity  
Through a systematic review methodology from 111 previous studies about RFID technology for public sector, we found six key areas of RFID applications: defense and security, identification, environmental  ...  Further research on RFID impact includes not only various theoretical issues of but also legal and managerial problems.  ...  Discussion and Conclusion We found, relying on a systematic review from 111 RFID studies, six key areas of RFID applications.  ... 
doi:10.1186/s40852-015-0010-z fatcat:undca4ws55fz7k42oj23yabupm

RFID Applications and Security Review

Cesar Munoz-Ausecha, Juan Ruiz-Rosero, Gustavo Ramirez-Gonzalez
2021 Computation  
This paper presents a review of the most cited topics regarding RFID focused on applications, security, and privacy.  ...  We extracted the top topics and reviewed the relevant indicators using a free Python tool, ScientoPy.  ...  Acknowledgments: This research was conducted as part of the MSc program in Telematic Engineering at the Universidad del Cauca, Popayán, Colombia, and by the Universidad del Cauca (501100005682).  ... 
doi:10.3390/computation9060069 fatcat:obj6ws6g3vf2jnjkemwm4zlkqi

What improves citizens' privacy perceptions toward RFID technology? A cross-country investigation using mixed method approach

Mohammad Alamgir Hossain, Yogesh K. Dwivedi
2014 International Journal of Information Management  
perceptions and tolerance of the citizens on privacy are different in these two regions.  ...  Privacy is a serious concern to Radio Frequency Identification (RFID) technology.  ...  Acknowledgement: The authors would like to thank the Editor and the anonymous reviewers for their constructive comments and suggestions for improvement of this paper  ... 
doi:10.1016/j.ijinfomgt.2014.07.002 fatcat:eaymnmkztzgczmvc3tiyjo7wmq
« Previous Showing results 1 — 15 out of 4,305 results