Radio Frequency Identification (RFID) systems have become popular for identifying not only objects but also persons. For example, in supply chain applications, the company can constantly track the movements of goods. Also, for Body Area Network or Personal Area Work, the tag is used for identifying a person. However, the movements and current locations of goods and a person's activity profiles are the sensitive information and should be kept secret. This paper develops the interaction protocols between readers and tags to address this privacy issue of protecting tagged objects from tracking and tracing by nonauthorized readers. © IFIP International Federation for Information Processing 2006.
CITATION STYLE
Chen, M. Y., Yang, C. N., & Lain, C. S. (2006). Authorized tracking and tracing for RFID tags. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4097 LNCS, pp. 435–444). Springer Verlag. https://doi.org/10.1007/11807964_44
Mendeley helps you to discover research relevant for your work.