Filters








5 Hits in 3.7 sec

MARP: Mobile Agent for RFID Privacy Protection [chapter]

Soo-Cheol Kim, Sang-Soo Yeo, Sung Kwon Kim
2006 Lecture Notes in Computer Science  
Our MARP, mobile agent for RFID privacy protection, has strong cryptographic modules with a powerful CPU and battery system and guarantees more high-level security than other protection schemes.  ...  Most of related works have focused on the cryptographic scheme for the RFID tag and the reader. In this paper, a proxy agent scheme using personal mobile device for the privacy protection.  ...  Mobile Agent for RFID Privacy Protection This section describes MARP scheme proposed in this study. MARP is a mobile device with high performance capability, memory and high calculation capability.  ... 
doi:10.1007/11733447_22 fatcat:y6npdxj4kvc5hov5c4tvdreany

The Privacy Protection Mechanism Applicable to Private Zone of Mobile RFID Systems
모바일 RFID 시스템의 Private Zone에 적용 가능한 프라이버시 보호 기법

Dong-Chul Kim, Ji-Young Chun, Eun-Young Choi, Dong-Hoon Lee
2009 The KIPS Transactions PartC  
Therefore, in this paper, we propose the secure and practicable privacy protection mechanism suitable to mobile RFID systems. proposing mechanism is applicable the mechanism to Private Zone of mobile RFID  ...  systems which require to protect the privacy.  ...  Juels 등이 제안한 High-Power 프 록시 REP 기법[2]은 가디언과 유사하지만 좀 더 향상된 기 능을 제공하는 기법으로 자체적으로 태그의 정보를 갱신함 Agent for RFID Privacy Protecting)기법[3]을 제안하였다.  ... 
doi:10.3745/kipstc.2009.16-c.2.189 fatcat:cytj4sjyefduhatsbqtqftxlhe

RFID TAG SECURITY, PERSONAL PRIVACY PROTOCOLS AND PRIVACY MODEL

Suchitra Majumdar, Kanchan Dhuri#2, Sandhya Dongre#3, Minakshi Badwaik#4
International Journal of Exploring Emerging Trends in Engineering (IJEETE)   unpublished
In this work we propose a proxy agent framework that uses a personal device for privacy enforcement and increased protection against eavesdropping, impersonation and cloning attacks.  ...  Radio Frequency Identification (RFID) is a method of remotely storing and retrieving data using small and inexpensive devices called RFID tags.  ...  Finally, the authors in [4] propose a scheme called MARP (Mobile Agent for RFID Privacy) that assumes the secrets of tags and uses them to mediate with reader requests once the tag has been put to sleep  ... 
fatcat:7jhneqy5avbljfzys5tvroggom

Security and Privacy in RFID Systems

Khaled Ouafi
2011
Contrarily to most RFID privacy models that limit privacy protection to the inability of linking the identity of two participants in two different protocol instances, we introduce a privacy model for RFID  ...  is PhD thesis is concerned with authentication protocols using portable lightweight devices such as RFID tags. ese devices have lately gained a signi cant attention for the diversity of the applications  ...  We took for examples, O-FRAP and O-FRAKE. . We reformulated Vaudenay's de nition of privacy.  ... 
doi:10.5075/epfl-thesis-5283 fatcat:sieghhxnfzd2vmpsamhzpz57da

Women and ARV-based prevention: opportunities and challenges

Cynthia W Geary, Elizabeth A Bukusi
2014 Journal of the International AIDS Society  
ARV-based HIV prevention methods available in pill, gel or ring formulations (broadly referred to as microbicides) offer the possibility of protection against HIV for women who find it difficult because  ...  The illustrations for HPTN 035 were drawn by Denise Todloski, and for IPM 027 by Lana Faasen.  ...  Jane Brown for their reviews of earlier versions of this manuscript and Dr. Erica Haney for help with the preparation of the manuscript.  ... 
doi:10.7448/ias.17.3.19419 fatcat:u3xmvjcp3zg5rl5lnrjtmn2ama