Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 20.

Add to Quick Collection   All 20 Results

Sort:
 Add All Items to Quick Collection
Date: 2017
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1248708
Description: RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Various solutions have been proposed but most of them have security and privacy vulnerabilities. In thi ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1049123
Description: Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that mu ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/328185
Description: Radio Frequency Identification (RFID) has been widely ad-opted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventio ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/280756
Description: In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a new RFID ownership transfer protocol using elliptic-curve cryptography. The paper first considers sec ... More
Reviewed: Reviewed
Date: 2013
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/275786
Description: We propose a new encryption primitive called Membership Encryption. Let P(G) be a privacy-preserving token on a group attribute/identity G, such that given P(G) it is hard to know the attributes in G. ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/280769
Description: Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols ... More
Reviewed: Reviewed
Date: 2013
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/262179
Description: An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of the tag is instituted by the supplier who initially owns the tag. In the view of a buyer, the validit ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/172402
Description: Passive RFID tags have limited rewritable memory for data storage and limited computation power, which pose difficulties to implement security protection on RFID tags. It has been shown that strong se ... More
Reviewed: Reviewed
Date: 2006
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/18027
Description: Scalable multi-service oriented group key management addresses issues relating to situations where dynamic group users have different privileges for accessing different sets of services. In this paper ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2005
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1166240
Description: 6 page(s)
Reviewed: Reviewed
Date: 2005
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1166244
Description: 6 page(s)
Reviewed: Reviewed
Date: 2004
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/29173
Description: This paper presents a new secure scheme for Protocol Independent Multicast Sparse Mode (PIM-SM). PIM is the predominant multicast routing protocol in use on the Internet today, where members of the mu ... More
Reviewed: Reviewed
Date: 2004
Subject Keyword: 080300 Computer Software
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1245081
Description: 10 page(s)
Reviewed: Reviewed
Date: 2004
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1245521
Description: 6 page(s)
Reviewed: Reviewed
Date: 2003
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1231701
Description: 5 page(s)
Reviewed: Reviewed