Mu'awya Naser, Mohammad Al Majaly, Muhammad Rafie, R. Budiarto
{"title":"基于三层分类模型的RFID人体识别系统安全框架","authors":"Mu'awya Naser, Mohammad Al Majaly, Muhammad Rafie, R. Budiarto","doi":"10.1109/ICSAP.2009.31","DOIUrl":null,"url":null,"abstract":"Abstract— Recent researches in the Radio FrequencyIDentification (RFID) attempt to raise solutions for generalapplications within the field, these solutions often are hinderedby the fact that different RFID deployments do not meet intheir specifications and need. In order for these solutions to bevalid and more useful; it has to be classified based on certaindesign requirements, and exploitation area. Our researchcontributes to those solutions in a novel model for a threetieredcategorization of the RFID systems in an attempt toundertake security and privacy risks into a betterunderstanding within a specific domain for a more optimizedaddressing of the problems encountered.","PeriodicalId":176934,"journal":{"name":"2009 International Conference on Signal Acquisition and Processing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model\",\"authors\":\"Mu'awya Naser, Mohammad Al Majaly, Muhammad Rafie, R. Budiarto\",\"doi\":\"10.1109/ICSAP.2009.31\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract— Recent researches in the Radio FrequencyIDentification (RFID) attempt to raise solutions for generalapplications within the field, these solutions often are hinderedby the fact that different RFID deployments do not meet intheir specifications and need. In order for these solutions to bevalid and more useful; it has to be classified based on certaindesign requirements, and exploitation area. Our researchcontributes to those solutions in a novel model for a threetieredcategorization of the RFID systems in an attempt toundertake security and privacy risks into a betterunderstanding within a specific domain for a more optimizedaddressing of the problems encountered.\",\"PeriodicalId\":176934,\"journal\":{\"name\":\"2009 International Conference on Signal Acquisition and Processing\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Signal Acquisition and Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSAP.2009.31\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Signal Acquisition and Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSAP.2009.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model
Abstract— Recent researches in the Radio FrequencyIDentification (RFID) attempt to raise solutions for generalapplications within the field, these solutions often are hinderedby the fact that different RFID deployments do not meet intheir specifications and need. In order for these solutions to bevalid and more useful; it has to be classified based on certaindesign requirements, and exploitation area. Our researchcontributes to those solutions in a novel model for a threetieredcategorization of the RFID systems in an attempt toundertake security and privacy risks into a betterunderstanding within a specific domain for a more optimizedaddressing of the problems encountered.