Back to Results
First PageMeta Content
Human–computer interaction / Electronic engineering / Clipped tag / Singulation / RuBee / Paul Moskowitz / Radio-frequency identification / Automatic identification and data capture / Technology


ALGSICS — Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems N. Bird1 , C. Conrado1 , J. Guajardo1 , S. Maubach2? , G.-J. Schrijen1 , B. Skoric1 , A.M.H. Tombeur1 , P. Thueringer3 , and
Add to Reading List

Document Date: 2006-11-06 06:07:38


Open Document

File Size: 171,55 KB

Share Result on Facebook

City

Eindhoven / Brownsville / Gratkorn / /

Company

IBM / Philips Research Laboratories / the AES / Philips Semiconductors / /

Country

United States / Netherlands / Austria / /

Currency

USD / /

/

Event

FDA Phase / Product Issues / /

Facility

University of Texas / /

IndustryTerm

lightweight protocols / authentication protocol / supply chain / cheaper solutions / targeted applications / ambient intelligent applications / binary tree algorithm / wireless communication capabilities / related work proposing algsics solutions / similar authentication protocols / technology more privacy / retailer product management / privacy preserving solutions / supply-chain management / so-called Internet / proxy device / public-key algorithm / trusted device / food packages / challenge-response protocol / normal singulation protocol / algorithmic solutions / stand-alone solutions / privacy sentinel device / privacy solutions / privacy enhancing technologies / cheaper device / security technologies / security solutions / /

MusicGroup

MHz / /

Organization

EPC / Service of Privacy In / Department of Mathematics / University of Texas / /

Product

RF interface / Fig / /

ProvinceOrState

Texas / /

Technology

encryption / public-key algorithm / security technologies / radiation / cellular telephone / authentication protocol / challenge-response protocol / laser / Cryptography / bar code / symmetric encryption / similar authentication protocols / existing privacy enhancing technologies / lightweight protocols / binary tree algorithm / key K. This protocol / secret key / simulation / RFID technology / normal singulation protocol / /

SocialTag