DC Field | Value | Language |
---|---|---|
dc.contributor.author | Konidala, D.M. | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2010-02-22T08:35:56Z | - |
dc.date.available | 2010-02-22T08:35:56Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2006-11 | - |
dc.identifier.citation | LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), v.4296 LNCS, no.0, pp.194 - 205 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/16762 | - |
dc.description.abstract | With mobile RFID technology, handheld portable devices like mobile phones and PDAs, also behave as RFID readers and RFID tags. As RFID readers, mobile phones provide an user-friendly approach to quickly and efficiently scan, access and view information about RFID tagged items, As RFID tags, mobile phones can quickly identify themselves in order to communicate with other tagged devices, which provide essential services. At the outset this paper briefly describes Mobile RFID technology and compare it with conventional RFID technology. We pioneer in categorizing Mobile RFID applications into three distinct zones, namely: Location-based Services (LBS) Zone, Enterprise Zone, and Private Zone. We describe application scenarios related to these zones and highlight various security and privacy threats. Finally, we propose a security architecture for LBS zone and describe our future work. © Springer-Verlag Berlin Heidelberg 2006. | - |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | Springer Verlag | - |
dc.title | Mobile RFID applications and security challenges | - |
dc.type | Article | - |
dc.identifier.scopusid | 2-s2.0-34547477287 | - |
dc.type.rims | ART | - |
dc.citation.volume | 4296 LNCS | - |
dc.citation.issue | 0 | - |
dc.citation.beginningpage | 194 | - |
dc.citation.endingpage | 205 | - |
dc.citation.publicationname | LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS) | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Konidala, D.M. | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.