A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
MARP: Mobile Agent for RFID Privacy Protection
[chapter]
2006
Lecture Notes in Computer Science
Our MARP, mobile agent for RFID privacy protection, has strong cryptographic modules with a powerful CPU and battery system and guarantees more high-level security than other protection schemes. ...
Most of related works have focused on the cryptographic scheme for the RFID tag and the reader. In this paper, a proxy agent scheme using personal mobile device for the privacy protection. ...
Mobile Agent for RFID Privacy Protection This section describes MARP scheme proposed in this study. MARP is a mobile device with high performance capability, memory and high calculation capability. ...
doi:10.1007/11733447_22
fatcat:y6npdxj4kvc5hov5c4tvdreany
The Privacy Protection Mechanism Applicable to Private Zone of Mobile RFID Systems
모바일 RFID 시스템의 Private Zone에 적용 가능한 프라이버시 보호 기법
2009
The KIPS Transactions PartC
모바일 RFID 시스템의 Private Zone에 적용 가능한 프라이버시 보호 기법
Therefore, in this paper, we propose the secure and practicable privacy protection mechanism suitable to mobile RFID systems. proposing mechanism is applicable the mechanism to Private Zone of mobile RFID ...
systems which require to protect the privacy. ...
Juels 등이 제안한 High-Power 프
록시 REP 기법[2]은 가디언과 유사하지만 좀 더 향상된 기
능을 제공하는 기법으로 자체적으로 태그의 정보를 갱신함
Agent for RFID Privacy Protecting)기법[3]을 제안하였다. ...
doi:10.3745/kipstc.2009.16-c.2.189
fatcat:cytj4sjyefduhatsbqtqftxlhe
RFID TAG SECURITY, PERSONAL PRIVACY PROTOCOLS AND PRIVACY MODEL
International Journal of Exploring Emerging Trends in Engineering (IJEETE)
unpublished
In this work we propose a proxy agent framework that uses a personal device for privacy enforcement and increased protection against eavesdropping, impersonation and cloning attacks. ...
Radio Frequency Identification (RFID) is a method of remotely storing and retrieving data using small and inexpensive devices called RFID tags. ...
Finally, the authors in [4] propose a scheme called MARP (Mobile Agent for RFID Privacy) that assumes the secrets of tags and uses them to mediate with reader requests once the tag has been put to sleep ...
fatcat:7jhneqy5avbljfzys5tvroggom
Security and Privacy in RFID Systems
2011
Contrarily to most RFID privacy models that limit privacy protection to the inability of linking the identity of two participants in two different protocol instances, we introduce a privacy model for RFID ...
is PhD thesis is concerned with authentication protocols using portable lightweight devices such as RFID tags. ese devices have lately gained a signi cant attention for the diversity of the applications ...
We took for examples, O-FRAP and O-FRAKE. . We reformulated Vaudenay's de nition of privacy. ...
doi:10.5075/epfl-thesis-5283
fatcat:sieghhxnfzd2vmpsamhzpz57da
Women and ARV-based prevention: opportunities and challenges
2014
Journal of the International AIDS Society
ARV-based HIV prevention methods available in pill, gel or ring formulations (broadly referred to as microbicides) offer the possibility of protection against HIV for women who find it difficult because ...
The illustrations for HPTN 035 were drawn by Denise Todloski, and for IPM 027 by Lana Faasen. ...
Jane Brown for their reviews of earlier versions of this manuscript and Dr. Erica Haney for help with the preparation of the manuscript. ...
doi:10.7448/ias.17.3.19419
fatcat:u3xmvjcp3zg5rl5lnrjtmn2ama