RFID privacy: An overview of problems and proposed solutions
As organizations aggressively deploy radio frequency identification systems, activists are
increasingly concerned about RFID's potential to invade user privacy. This overview highlights …
increasingly concerned about RFID's potential to invade user privacy. This overview highlights …
RFID security and privacy: A research survey
A Juels - IEEE journal on selected areas in communications, 2006 - ieeexplore.ieee.org
This paper surveys recent technical research on the problems of privacy and security for
radio frequency identification (RFID). RFID tags are small, wireless devices that help identify …
radio frequency identification (RFID). RFID tags are small, wireless devices that help identify …
PORs: Proofs of retrievability for large files
A Juels, BS Kaliski Jr - Proceedings of the 14th ACM conference on …, 2007 - dl.acm.org
In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables
an archive or back-up service (prover) to produce a concise proof that a user (verifier) can …
an archive or back-up service (prover) to produce a concise proof that a user (verifier) can …
Arksey and O′ Malleyʼs consultation exercise in scoping reviews: A critical review
…, CB Rossen, R Søndergaard, A Juel - Journal of advanced …, 2022 - Wiley Online Library
Aims To explore how consultation exercises were described in a convenience sample of recent
scoping reviews. Design Critical literature review. Data sources We searched PsycINFO, …
scoping reviews. Design Critical literature review. Data sources We searched PsycINFO, …
Anion intercalation into graphite drives surface wetting
The unique layered structure of graphite with its tunable interlayer distance establishes
almost ideal conditions for the accommodation of ions into its structure. The smooth and …
almost ideal conditions for the accommodation of ions into its structure. The smooth and …
Stealing machine learning models via prediction {APIs}
Machine learning (ML) models may be deemed confidential due to their sensitive training
data, commercial value, or use in security applications. Increasingly often, confidential ML …
data, commercial value, or use in security applications. Increasingly often, confidential ML …
The blocker tag: Selective blocking of RFID tags for consumer privacy
We propose the use of "selective blocking" by "blocker tags" as a way of protecting consumers
from unwanted scanning of RFID tags attached to items they may be carrying or wearing.…
from unwanted scanning of RFID tags attached to items they may be carrying or wearing.…
Authenticating pervasive devices with human protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive
computing devices. These devices lack the computational, storage, power, and communication …
computing devices. These devices lack the computational, storage, power, and communication …
Scaling of the turbulence transition threshold in a pipe
We report the results of an experimental investigation of the transition to turbulence in a
pipe over approximately an order of magnitude range in the Reynolds number Re. A novel …
pipe over approximately an order of magnitude range in the Reynolds number Re. A novel …
Proofs of retrievability: Theory and implementation
… Our framework improves the previously proposed POR constructions of Juels-Kaliski and
Shacham-… We propose a new variant on the Juels-Kaliski protocol and describe a prototype …
Shacham-… We propose a new variant on the Juels-Kaliski protocol and describe a prototype …