Some Methods for Privacy in RFID Communication
- 1 January 2005
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 4 references indexed in Scilit:
- An architecture for privacy-sensitive ubiquitous computingPublished by Association for Computing Machinery (ACM) ,2004
- The blocker tagPublished by Association for Computing Machinery (ACM) ,2003
- Secure verification of location claimsPublished by Association for Computing Machinery (ACM) ,2003
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003