2008
DOI: 10.1016/j.pmcj.2008.09.005
|View full text |Cite
|
Sign up to set email alerts
|

A cross-layer framework for privacy enhancement in RFID systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…That is, the back-end can extract and process the private information containing in the combined travel (Juels and Pappu, 2002) ii. Indirect identification ID encryption b) Unencrypted ID during anti-collision Randomized bit encoding (Lim et al, 2008b); bit collision masking (Choi and Roh, 2006;Lim et al, 2008a) (protocol dependent) c) PHY-layer identification Shielding; switchable antennas (Gudymenko, 2011) 2. Information linkage Anonymization (in front-end and back-end): threat 1 countermeasures; privacy-respecting data processing…”
Section: Analysis (Estimation) Of the Efficiency Of Countermeasures Imentioning
confidence: 99%
“…That is, the back-end can extract and process the private information containing in the combined travel (Juels and Pappu, 2002) ii. Indirect identification ID encryption b) Unencrypted ID during anti-collision Randomized bit encoding (Lim et al, 2008b); bit collision masking (Choi and Roh, 2006;Lim et al, 2008a) (protocol dependent) c) PHY-layer identification Shielding; switchable antennas (Gudymenko, 2011) 2. Information linkage Anonymization (in front-end and back-end): threat 1 countermeasures; privacy-respecting data processing…”
Section: Analysis (Estimation) Of the Efficiency Of Countermeasures Imentioning
confidence: 99%