Recovering and restoring tampered RFID data using steganographic principles
Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try...
| Main Authors: | Mohan, M., Potdar, Vidyasagar, Chang, Elizabeth |
|---|---|
| Format: | Conference Paper |
| Published: |
IEEE Computer Society Press
2006
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/30814 |
Similar Items
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006)
by: Potdar, M., et al.
Published: (2006)
Low-Cost RFID Identification Variation
by: Lin, K., et al.
Published: (2006)
by: Lin, K., et al.
Published: (2006)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
The data integrity problem and multi-layered document integrity
by: Moss, Ben
Published: (2007)
by: Moss, Ben
Published: (2007)
Passive RFID tag for biomass tracking and monitoring
of temperature and humidity level
by: Ali, Amjad
Published: (2024)
by: Ali, Amjad
Published: (2024)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
Antecedents of Continuance Intention of RFID Technology in Western Australian Farms
by: Hossain, Mohammad, et al.
Published: (2012)
by: Hossain, Mohammad, et al.
Published: (2012)
Autonomous robot navigation and path following via
RFID tag detection
by: Castle-Green, Simon
Published: (2017)
by: Castle-Green, Simon
Published: (2017)
Radio frequency identification (RFID) adoption: a cross-sectional comparison of voluntary and mandatory contexts
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
Spatial and Temporal Analysis on the Distribution of Active Radio-Frequency Identification (RFID) Tracking Accuracy with the Kriging Method
by: Liu, Xin, et al.
Published: (2014)
by: Liu, Xin, et al.
Published: (2014)
Impact of External Environmental Factors on RFID Adoption in Australian Livestock Industry: An Exploratory Study
by: Hossain, M., et al.
Published: (2010)
by: Hossain, M., et al.
Published: (2010)
Does Mandatory Pressure Increase RFID Adoption? A Case Study of Western Australian Livestock Industry
by: Hossain, Mohammad, et al.
Published: (2013)
by: Hossain, Mohammad, et al.
Published: (2013)
Developing and validating a model explaining the assimilation process of RFID: An empirical study.
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
Developing and validating a hierarchical model of external responsiveness: A study on RFID technology
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
Breach with Intent: A Risk Analysis of Deliberate Security Breaches in the Seafood Supply Chain
by: Forbes, David, et al.
Published: (2015)
by: Forbes, David, et al.
Published: (2015)
The Experimental Application of an Occupant Tracking Technology in Domestic Post-Occupancy Evaluation
by: Holland, Richard
Published: (2006)
by: Holland, Richard
Published: (2006)
Wireless multimedia sensor networks: a survey
by: Potdar, Vidyasagar, et al.
Published: (2009)
by: Potdar, Vidyasagar, et al.
Published: (2009)
Applications of wireless sensor networks in pharmaceutical industry
by: Potdar, M., et al.
Published: (2009)
by: Potdar, M., et al.
Published: (2009)
Implementing RFID in China: A Critical Comparison between National and Foreign Owed Retailers
by: Wang, Luo
Published: (2011)
by: Wang, Luo
Published: (2011)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
An Automated Approach to Construction Site Layout Generation.
by: Akanmu, A., et al.
Published: (2014)
by: Akanmu, A., et al.
Published: (2014)
Adoption, continued, and extended use of radio frequency identification (RFID) technology : Australian Livestock Industry
by: Mohammad Alamgir, Hossain
Published: (2012)
by: Mohammad Alamgir, Hossain
Published: (2012)
Manufacturing and Logistics Information Systems
by: Wood, Lincoln, et al.
Published: (2015)
by: Wood, Lincoln, et al.
Published: (2015)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Toward a Revolution in Australian Children’s Data and Privacy
by: Leaver, Tama, et al.
Published: (2023)
by: Leaver, Tama, et al.
Published: (2023)
Understanding the challenges of using personal data in media experiences
by: Sailaja, Neelima
Published: (2020)
by: Sailaja, Neelima
Published: (2020)
Researching the transparency of personal data sharing: designing a concert receipt
by: Styliari, Tatiana C., et al.
Published: (2016)
by: Styliari, Tatiana C., et al.
Published: (2016)
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Evaluation of Radio Frequency Identification (RFID) technology as a tracking instrument in the supply chain of pharmaceutical products with a case study at ZLB Behring GmbH
by: Fischer, Thorsten
Published: (2005)
by: Fischer, Thorsten
Published: (2005)
Novel fusion tags for protein production, purification and research applications
by: HALAWA, MOHAMED
Published: (2020)
by: HALAWA, MOHAMED
Published: (2020)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Path recovery for ad-hoc on-demamd distance 6lowpan routing protocol
by: Ee, Gee Keng
Published: (2013)
by: Ee, Gee Keng
Published: (2013)
The practical politics of sharing personal data
by: Tolmie, Peter, et al.
Published: (2017)
by: Tolmie, Peter, et al.
Published: (2017)
Dasar Keselamatan ICT Universiti Teknologi MARA / Pejabat Infrastruktur dan Infostruktur, UiTM
by: UiTM, Pejabat Infrastruktur dan Infostruktur
Published: (2018)
by: UiTM, Pejabat Infrastruktur dan Infostruktur
Published: (2018)
Traumatic memory in Chigozie Obioma’s The Fishermen and Vaddey Ratner’s in the Shadow of the Banyan
by: Al Mubarak, Ahmed Dhakaa Abdulwahhab
Published: (2019)
by: Al Mubarak, Ahmed Dhakaa Abdulwahhab
Published: (2019)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Similar Items
-
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006) -
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006) -
Low-Cost RFID Identification Variation
by: Lin, K., et al.
Published: (2006) -
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)