Small Tech, Big Issues
|
|
|
- Marybeth Wilson
- 10 years ago
- Views:
Transcription
1 Small Tech, Big Issues
2 How It Works Advantages of RFID History of the RFID Proposed Uses Identification Medical Records Immigration Security Authentication Ethical Issues Purchase tracking Lack of encryption Location tracking Unauthorized tag reading Requiring implant for job / immigration
3 1. Controller initiates read 2. Reader antenna sends short range radiofrequency signals 3. Tag converts signal to energy 4. Tag uses stored energy to transmit its memory contents back to reader 5. Reader antenna collects sent data
4 Tags are: Cheap Resilient Long lived Don t need power source Small Operate under extreme conditions (cold / heat) Contactless recognition Through materials like plastic, glass, wood Can be made invisible to the user
5 In WW2, the Germans, Japanese, Americans, and British were all using radar No way to identify planes Germans discovered that if pilots rolled their planes as they returned to base, it would change the radio signal reflected back First passive RFID system
6 EAS Systems Introduced Checkpoint Sensormatic 1 bit tags: on or off Deactivated by partially destroying capacitor by running tag over a strong electromagnetic field Multi bit tags size of a loaf of bread, size limited by circuitry eas_or_rfid_new_labels_prompt.html
7 tech gadgets/rfid.htm
8 verichip.jpg RefererURL=/article/articleview/4055/
9 Received permission from USFDA to market VeriChip in implants as of 2007 ~$ digit code (128 bits)
10 Although currently PositiveID does not actively market the VeriMed system, it continues to support existing patients and healthcare facilities. PositiveID website FAQ
11 Medical Records Immigration Security Authentication Kidnapping Prevention Tracking of criminals/parole.and sick people?
12 # of record in secure database Focus market: Cancer patients, people w/ pacemakers, or people who might be cognitively impaired
13 Detection: How does ER staff know you have a VeriChip? Bracelet? Tattoo? Big problems if not detected Does hospital have RFID reader? Health Issues CAUSED by chip?
14 The potential risks to health associated with the device are: adverse tissue reaction; migration of implanted transponder; compromised information security; failure of implanted transponder; failure of inserter; failure of electronic scanner; electromagnetic interference; electrical hazards; magnetic resonance imaging incompatibility; and needle stick. USFDA fda letter.pdf
15 CEO of VeriChip proposed implants in immigrants and guest workers to assist the government in later identifying them President of Columbia quoted telling a US senator that he would agree to require Columbian citizens to be implanted before they could gain entry into the US for seasonal work
16 Who pays for it? Maintenance? Problems w/ chip? Cloning? Dangerous Precedent Similar to branding cattle or tattoos the Nazis forced on their victims in concentration camps?
17 Suggested use by VeriChip 2004: Mexico s attorney general Carlos Altamirano and staff receive VeriChip implants for the purposes of access, for security /040714_mexicoChip_hmed_3p.hmedium.jpg
18 Lack of encryption Power/memory constraints prevent any security measures, rolling code and challenge response authentication systems being worked on Unauthorized reading Few laws preventing Hand held readers ~$250 Make your own? Cloning
19 2000+ Mexican citizens have had tags implanted for the purpose of tracking in case they are kidnapped No GPS capabilities in current RFID implants.. CEO of VeriChip s parent company concedes that the company s Mexican distributor may not have tried very hard to dispel the notion that VeriChips have GPS capabilities, which would be required for real remote tracking [McHugh]
20
21 life in the U.S. will become difficult for those who do not want a chip inside them (in much the same way as it is currently difficult for anyone without a credit card, cellphone, address or internet access positiveid deal advances use of microchipimplants in florida health system/).
22 If there were a societal benefit, could a government require individuals to modify their bodies? For public health purposes, the answer is yes. In the United States, for example, students must have certain immunizations before attending public school. Foster & Jaeger
23 Little legislation Washington (2008) Unauthorized Reading California, Georgia, North Dakota, Virginia, Wisconsin Prohibits forced RFID implants 28(?) other states w/pending RFID legislation Need a comprehensive set of regulations EPIC Electronic Privacy Information Center Public interest research center No clients, no customers, no shareholders
24 Give notice of: Tag Presence Reader Presence Reading Activity Removal Anonymity Priority Security Openness Accountability Rights Access Removal Accountability
25 RFID implants can be powerful tools if used while being conscious of their vulnerabilities or if sufficient advances in the technology are made. Even though RFID implants aren t widely deployed at this time, legislation needs to be put in place to prevent potential issues from turning into real issues.
26 Bacheldor, Beth. American Medical Association Issues Ethics Code for RFID Chip Implants. RFID Journal. 17 July Accessed 11 May < Foster, Kenneth and Jaeger, Jan. RFID Inside: The Murky Ethics of Implanted Chips. University of Pennsylvania Department of Bioengineering Reprinted from IEEE Spectrum, March 2007, < Guidelines on Commercial Use of RFID Technology. Electronic Privacy Information Center. July pdf Landt, Jeremy. The history of RFID. IEEE Potentials. October/November McHugh, Josh. A Chip in Your Shoulder. Slate.com. 10 November Microchip implant (human). Wikipedia. < Perakslis, Christine and Wolk, Robert. Social Acceptance of RFID as a Biometric Security Method. IEEE Technology and Society Magazine. Fall < Radio frequency identification. Wikipedia. < Weissert, Will. Mexican attorney general personally goes high tech for security. USA Today. 14 July mex security implant_x.htm Westhues, Jonathan. Demo: Cloning a Verichip. July < Witt, Sam. Is human chip implant wave of the future?. CNN.com. January 14, <
27 Be gentle
The murky ethics of implanted chips
biomedical RFID The murky ethics of implanted chips by Kenneth R. Foster & Jan Jaeger 24 IEEE Spectrum March 2007 NA www.spectrum.ieee.org gusto images Anatomy of an RFID Tag as an antenna and uses an
RF ID Security and Privacy
RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Tracking People s Movements by RFID Implants
Tracking People s Movements by RFID Implants Name: Seyed Saeid Saadatmand Email: [email protected] Phone number: 716 464 0445 Address: 15 Windham Way - Apt # c Amherst NY - 14228 Program: Urban Planning
RECOMMENDATIONS COMMISSION
16.5.2009 Official Journal of the European Union L 122/47 RECOMMENDATIONS COMMISSION COMMISSION RECOMMENDATION of 12 May 2009 on the implementation of privacy and data protection principles in applications
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
RFID in a nutshell. Colin Jervis, Director, Kinetic Consulting Ltd
Colin Jervis, Director, Kinetic Consulting Ltd Enthusiasts in healthcare fields suggest that one day a tiny RFID (or radio-frequency identification) tag implanted under your skin could transmit your NHS
COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of 12.5.2009
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 12.5.2009 C(2009) 3200 final COMMISSION RECOMMENDATION of 12.5.2009 on the implementation of privacy and data protection principles in applications supported
The Drug Quality & Security Act
The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply
RFID Security and Privacy. Simson L. Garfinkel, Ph.D. Center for Research on Computation and Society Harvard University October 5, 2005
RFID Security and Privacy Simson L. Garfinkel, Ph.D. Center for Research on Computation and Society Harvard University October 5, 2005 1 RFID: The Industry s Vision. Distribution Center Consumer Docks
How To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
White Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now
Invensys is now White Paper Wonderware Mobile Solutions RFID Technology Author: Don Frieden, VP Mobile Solutions, Invensys What s Inside: 1. Radio Frequency Identification (RFID) 2. The Wonderware Tracking
WHITE PAPER. ABCs of RFID
WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
CHAPTER 1 Introduction 1
Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation
RFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
CONSUMER PERSPECTIVES OF IMPLANTED RADIO FREQUENCY IDENTIFICATION (RFID) DEVICES FOR MEDICAL INFORMATION RETRIEVAL
CONSUMER PERSPECTIVES OF IMPLANTED RADIO FREQUENCY IDENTIFICATION (RFID) DEVICES FOR MEDICAL INFORMATION RETRIEVAL Andrew S. Jensen Department of Computer Science College of Computing and Informatics University
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com RF-based Ticketing
ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)
ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you
Micro-Chip Implant: Would you get one?
Micro-Chip Implant: Would you get one? Arslan Afzaal MAY 24, 2013 DE MONTFORT UNIVERSITY Leicester, UK Abstract Microchip implant is the process of implanting a chip into a human. The frequently used chip
NEW TECHNOLOGY. Figure 1. Simplified view of data transfer in low-frequency passive RFID tags (the tag is enlarged for clarity).
RFID offers tantalizing benefits for supply chain management, inventory control, and many other applications. Find out whether your company could benefit. Ron Weinstein RFID: A Technical Overview and Its
RFID Design Principles
RFID Design Principles Second Edition Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents CHAPTER 1 Introduction CHAPTER 2 Short-Range Communications Systems 2.1 Radio-Frequency Spectrum
Ethical Use of RFID in for the Surveillance of People and the Tracking of Things in Healthcare Delivery
Ethical Use of RFID in for the Surveillance of People and the Tracking of Things in Healthcare Delivery By Michael J. Wilson M.Sc. ehealth Candidate McMaster University Canadian Bioethics Society Conference
Data Protection Technical Guidance Radio Frequency Identification
Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
Reactec s HAVmeter depends on CoreRFID. A Case Study.
Reactec s HAVmeter depends on CoreRFID The design and supply service provided by CoreRFID has helped to ensure the success of the HAVmeter system in very demanding working environments. Mark-Paul Buckingham,
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
RFID Based Real Time Password Authentication System for ATM
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 RFID Based Real Time Password Authentication System for ATM Soniya B. Milmile 1 Prof.
K.Srinivasu Ravi 1, Seema Kalangi 2, Veeraiah Maddu 3
REPLACING E- PASSPORT USING BIO-CHIP WITH UNIQUE IDENTIFICATION (ADHAAR ID) K.Srinivasu Ravi 1, Seema Kalangi 2, Veeraiah Maddu 3 1 Professor, ECM Department, KL University, A.P, India. 2 (I/II) M.TECH,
Dr. Asher Vaturi The Max Stern Yezreel Valley College
Dr. Asher Vaturi The Max Stern Yezreel Valley College Performance indicators for Indoor and outdoor environment built areas Concern about the overall quality of the indoor environment We focus on issues
Microchip FAQ's All you wanted to know about microchips but were afraid to ask!
Microchip FAQ's All you wanted to know about microchips but were afraid to ask! International Committee for Animal Recording (ICAR) ICAR Newsletter - March 1999 Electronic Identification Special Edition
Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework
International Journal of Research in Information Technology (IJRIT) www.ijrit.com ISSN 2001-5569 Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS
Wireless Data Network Security 1 Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS Wireless Data Network Security for Hospitals: Various Solutions to Meet HIPAA Requirements. Jody Barnes East
RFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam [email protected] 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results
The RFID Revolution: Your voice on the Challenges, Opportunities and Threats Online Public Consultation Preliminary Overview of the Results 16 October 2006 Disclaimer: This document is a working document
An Overview of RFID Security and Privacy threats
An Overview of RFID Security and Privacy threats Maxim Kharlamov [email protected] The University of Auckland October 2007 Abstract Radio Frequency Identification (RFID) technology is quickly deploying
Ethical Implications of Implantable Radiofrequency Identification (RFID) Tags in Humans
The American Journal of Bioethics, 8(8): 44 48, 2008 Copyright c Taylor & Francis Group, LLC ISSN: 1526-5161 print / 1536-0075 online DOI: 10.1080/15265160802317966 Target Article Ethical Implications
HUMAN MICROCHIP IMPLANTATION
Received March 3, 2008/ Accepted July 14, 2008 J. Technol. Manag. Innov. 2008, Volume 3, Issue 3 HUMAN MICROCHIP IMPLANTATION Charles Smith (1) Abstract Radio Frequency Identification (RFID) has generated
RFID TECHNOLOGY USED FOR IDENTIFICATION AND TEMPERATURE MONITORING OF CATTLE
RFID TECHNOLOGY USED FOR IDENTIFICATION AND TEMPERATURE MONITORING OF CATTLE I. HUłU 1, F. IONESCU 2, A. CIMPONERIU 3, M. CHILINłAN 3 1 Extension Unit - Banat University of Agricultural Science and Veterinary
RFIDs and European Policies
ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit [email protected] European Commission Directorate
Executive summary. by Steve Nibbelink, CHPA
by Steve Nibbelink, CHPA Eecutive summary Healthcare facilities use radio frequency identification (RFID) and real-time location systems (RTLS) to identify, locate, track, and monitor patients, visitors,
GUIDELINES REGARDING THE PROCESSING OF PERSONAL DATA BY MEANS OF SMART CARDS AND RFID TAGS
Document 2.1.4-4 GUIDELINES REGARDING THE PROCESSING OF PERSONAL DATA BY MEANS OF SMART CARDS AND RFID TAGS Component 2 Activity 2.1.4-4 Final Version February 2012 The content of this report is the sole
Automated Identification Technologies
Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions [email protected] Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT
A. Background. In this Communication we can read:
On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background
Contents. 1. Introduction
1. Introduction Contents 2. How do Cell Phone Towers work? 3. What is the radiation produced by a cell phone? 4. How are people exposed to the energy from cellular phone towers? 5. Do cellular phone towers
RF Attendance System Framework for Faculties of Higher Education
RF Attendance System Framework for Faculties of Higher Education Ms. Unnati A. Patel 1 Dr. Swaminarayan Priya R 2 1 Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India 2 Head & ProfessorHH,
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit
Using Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
Mobile. Task 1. Report2: Mobile Phones and Radiation Page 1
Mobile 2 Phones and Radiation Starting Point You may have seen headlines in newspapers and stories on TV about the health dangers of mobile phones. Some people have said they may cause cancer and infertility.
Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda
Security Issues in RFID systems By Nikhil Nemade Krishna C Konda Agenda Introduction to an RFID System Possible Application Areas Need for Security Vulnerabilities of an RFID system Security Measures currently
What are radio signals?
Mobile phones and other wireless technologies have become an integral part of everyday life. But does using a mobile phone regularly, or living near a base station, have any implications for our health?
The Place of Emerging RFID Technology in National Security and Development
The Place of Emerging RFID Technology in National Security and Development Akintola K.G. Boyinbode O.K. Computer Science Department, Computer Science Department, University of Houston-Victoria, University
Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V.
EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management
Radio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
RFID Based Centralized Patient Monitoring System and Tracking (RPMST)
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 08-15 RFID Based Centralized Patient Monitoring System and Tracking
Obama Care Approves RFID Chips
Breaking News 6 August 2012 The Witness Obama Care Approves RFID Chips Americans Will Get RFID Microchip July 26, 2012 Americans Will Get RFID Microchip. Surely but slowly they are implementing RFID chips
Various Attacks and their Countermeasure on all Layers of RFID System
Various Attacks and their Countermeasure on all Layers of RFID System Gursewak Singh, Rajveer Kaur, Himanshu Sharma Abstract RFID (radio frequency identification) system is one of the most widely used
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
Introduction to Information Technology
Introduction to Information Technology Career Cluster Information Technology Course Code 10009 Prerequisite(s) Recommended that a student has taken from the Foundation Courses Computer Applications. Credit.5
What Merchants Need to Know About EMV
Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the
The Success Family of CE Companies Affordable CE Success CE Success Live CE FirstChoice CE
Annuity Continuing Education Requirements by State As of September 17, 2015 Care has been taken to provide accurate information in the subject matter provided within this document. This information is
ELECTROMAGNETIC FIELDS AND PUBLIC HEALTH HEALTH AND SAFETY GUIDELINES #1
SINGAPORE, 16 AUGUST 2001 HEALTH SCIENCES AUTHORITY PRESS RELEASE ELECTROMAGNETIC FIELDS AND PUBLIC HEALTH HEALTH AND SAFETY GUIDELINES #1 THE EMF HEALTH ISSUE 1 Over the past years a large number of scientific
Secure egovernment Where convenience meets security. www.infineon.com/ccs
Secure egovernment Where convenience meets security www.infineon.com/ccs Gaining transparency Electronic ID documents replace and enhance conventional ID documents that governments have been issuing for
Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Credit Card Fraud The Contactless Generation Kristin Paget
Credit Card Fraud The Contactless Generation Kristin Paget Chief Hacker, Recursion Ventures [email protected] @KrisPaget WHAT'S COMING UP? Contactless payments What is EMV? How does NFC fit in? Threat
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
EMISSION OF RADIO FREQUENCY RADIATION BY CELLULAR PHONES <STUDENT NAME(S)> DEN 399 RESEARCH PROPOSAL MAY 1, 200
EMISSION OF RADIO FREQUENCY RADIATION BY CELLULAR PHONES DEN 399 RESEARCH PROPOSAL MAY 1, 200 Abstract: This project will involve studying how much radio frequency a human brain is exposed
a GAO-05-551 GAO INFORMATON SECURITY Radio Frequency Identification Technology in the Federal Government Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters May 2005 INFORMATON SECURITY Radio Frequency Identification Technology in the Federal Government a GAO-05-551 Accountability
An Introductory and Elementary Study on RFID & Its Applications
An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract
Your Mobile Phone as a Ticket (NFC)
Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
Implementing high-level Counterfeit Security using RFID and PKI
Implementing high-level using RFID and PKI Drugs as example products RFID SysTech 2007 June, 13 Andreas Wallstabe, Hartmut Pohl Technologies RFID, PKI Anti-ing Implementation, Review und Suspected damage:
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Software Requirements Specification Document
Software Requirements Specification Document Version 1.0 Design and Development of CSC based Multi-Utility System Including Access Control and Attendance Monitoring Team SDET: The Smart People Prof. Rahul
RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID)
DOC NO. INTERNET-31-05 DATE ISSUED: APRIL, 2005 RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID) Introduction The Trans Atlantic Consumer Dialogue (TACD) believes action is urgently needed to address
