Selected articles for topic: cryptographically enabled rfid device
→ 6 articles
No video selected for that topic
CiteSeerX — Citation Query Rfid privacy: An overview of ...
RFID security and privacy: A research survey
by Ari Juels - ISBN 978-89-5519-136-3 -88- Feb. 17-20, 2008 ICACT 2008 , 2006
"... Abstract--This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to...
Website:
http://citeseerx.ist.psu.edu
About Smart Cards : Frequently Asked Questions – Secure ...
A smart card is a device that includes an embedded integrated circuit that can be either a secure microcontroller or equivalent intelligence with internal memory or a memory chip alone. The card connects to a reader with direct physical contact or with a remote contactless radio frequency interface. With an embedded microcontroller, smart cards have the unique ability to store large amounts of...
Website:
https://www.securetechalliance.org
smart credit cards - Smart Card Alliance
What security capabilities do contactless smart cards support?
What is a smart card?
A smart card is a device that includes an embedded integrated circuit that can be either a secure microcontroller or equivalent intelligence with internal memory or a memory chip alone. The card connects to a reader with direct physical contact or with a remote contactless radio frequency interface. With an...
Website:
http://www.smartcardalliance.org
Related topics : rfid chip card security / rfid chip credit card security / rfid chip smart card / rfid smart card frequency / difference between rfid and contactless smart card
Figure 1 from Attacking an AES-Enabled NFC Tag ...
Similar Papers
Abstract
Radio-frequency identification (RFID) technology is the enabler for applications like the future internet of things (IoT), where security plays an important role. When integrating security to RFID tags, not only the cryptographic algorithms need to be secure but also their implementation. In this work we present differential power analysis (DPA) and differential electromagnetic analysis (DEMA) attacks on a securityenabled RFID tag. The attacks are conducted on both an...
Website:
https://www.semanticscholar.org
Related topics : rfid tag chip design / rfid security tag / design of rfid tag / rfid tag frequency / rfid tag identification
UCODE®|NXP
Products
Ideal for supply chain and logistics applications requiring high-speed operation, NXP's EPCglobal-compliant UCODE passive UHF transponder IC family offers high anti-collision rates, high sensitivity for long read range, and wide frequency range for worldwide application. The UCODE IC family provides varying memory sizes and other special features to allow the user to select the best...
Website:
nxp.com
Related topics : active rfid tag read range / passive rfid tag read range / rfid tag read range / rfid reader long read range / uhf rfid tag ic
Apriva Reader | Apriva
Keep Secure Data on Lockdown
Provide employees with this wearable, Bluetooth-capable smart card reader (SCR) to verify their identity and control access to sensitive data. With extensive integration capabilities and PKI authentication support, the Apriva Reader and its complementary products deliver unparalleled authentication control to government and private entities.
Features & Benefits
Extreme Encryption
This solution provides ultimate security with AES 256 encryption and the FIPS1402-2 Level 3 hardware encryption module. (HSPD-12 Compliant)
Broad Compatibility
The industry-leading Apriva Reader is compatible with...
Date: 2017-12-09 22:53:47
Website:
http://www.apriva.com
Related topics : mobile rfid reader with bluetooth connectivity / rfid reader mobile device / rfid enabled mobile devices / android rfid reader device / rfid smart card reader
6 Resources