2,398 research outputs found

    Privacy-preserving authorised RFID authentication protocols

    Get PDF
    Radio Frequency Identification (RFID) has been widely adopted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by different parties. Although the private information should not be shared, the system should allow a valid tag to be authenticated by a legal reader. The challenge in designing the system is preserving the tag and reader\u27s privacy. In this paper, we propose a novel concept of authorized RFID authentication. The proposed protocols allow the tag to be merely identifiable by an authorized reader and the server cannot reveal the tag during the reader-server interaction. We provide a formal definition of privacy and security models of authorized authentication protocols under the strong and weak notions and propose three provably secure protocol

    Wide-weak Privacy Preserving RFID Mutual Authentication Protocol

    Get PDF
    Radio Frequency IDentification (RFID) systems are gaining enormous interests at industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more, important concern in RFID system because of pervasiveness of RFID tags. Over the years, many protocols have been proposed for RFID tags\u27 identification using different cryptographic primitives. It has been observed that most of them provide tags\u27 identification, but they fail to preserve tags\u27 privacy. It has been also proven that public-key primitives are essential for strong privacy and security requirements in RFID systems. In this paper, we present a mutual authentication protocol for RFID systems using elliptic curves arithmetic. Precisely, the proposed protocol provides narrow-strong and wide-weak privacy and resists tracking attacks under standard complexity assumption. The protocol is compared with related works and found efficient in comparison to others

    Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy

    Get PDF
    Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary can not trace the tag later even if he reveals the internal states of the tag sometimes before. In this paper, we analyze two recently proposed RFID authentication schemes: Randomized GPS and Randomized Hashed GPS scheme. We show both of them can not provide backward privacy in Juels and Weis privacy model, which allows the adversary to know whether the reader authenticates the tag successfully or not. In addition, we present a new protocol, called Challenge-Hiding GPS, based on the Schnorr identification scheme. The challenge is hidden from the eavesdropping through the technique of Diffie-Hellman key agreement protocol. The new protocol can satisfy backward privacy, and it has less communication overheads and almost the same computation, compared with the two schemes analyzed

    Discrimination in Barcelona 2018

    Get PDF
    Podeu consultar la versió en català a: http://hdl.handle.net/11703/113948Podeu consultar la versió en castellà a: http://hdl.handle.net/11703/11452

    Conclusion to Buying the Field: Catholic Religious Life in Mission to the World

    Get PDF
    The end of this volume is also the end of a project which has taken almost twelve years to complete, namely, an examination, interdisciplinary analysis, and spirituality oriented theological interpretation of Catholic Religious Life as it has emerged and is continuing to develop from the renewal of Vatican II, and is now manifesting itself with ever-increasing confidence as a renewed and transformed reality in the Church. This renewing lifeform is both deeply continuous with its two-thousand-year history and startlingly different from anything anyone alive today knew as Religious Life until close to the last quarter of the twentieth century. The conciliar renewal has transformed Religious Life which is, in turn, transforming the conciliar renewal from a dream of the heart to an incarnation of hope, not only in Religious Life itself but in the Church as a whole. When I entitled the work Religious Life in a New Millennium I had no idea it would be more than one volume in length and never suspected it would take more than the first decade of the new millennium to complete. But as this final volume goes to press I discern the breath of the Spirit of God in what has often seemed me rely interminable human impediments to finishing the project. If the work had not been able (indeed forced) to take account of the developments of the last decade it would be far less adequate as a treatment of con temporary Religious Life and probably much less usable for the immediate future. The last few years in particular have seen a weaving together, partly under adverse ecclesiastical pressure on American women Religious,1 but mainly through the increasingly confident appropriation by Religious of what they have been living and becoming since the Council, of many experimental strands into a strong fabric whose pattern is increasingly clear and hopeful. There is today a new sense among many Religious of identity, solidarity, and enthusiasm for the future that feels like the end of the beginning of renewal and the beginning of a transformed maturity in the history of this life. This writing project began at the turn of the millennium with the publication of the first volume in 2000 and it will be completed, fittingly enough, with the publication of this third volume in 2013, during the golden jubilee of the Second Vatican Council

    The Anchor, Volume 84.07: November 1, 1971

    Get PDF
    The Anchor began in 1887 and was first issued weekly in 1914. Covering national and campus news alike, Hope College’s student-run newspaper has grown over the years to encompass over two-dozen editors, reporters, and staff. For much of The Anchor\u27s history, the latest issue was distributed across campus each Wednesday throughout the academic school year (with few exceptions). As of Fall 2019 The Anchor has moved to monthly print issues and a more frequently updated website. Occasionally, the volume and/or issue numbering is irregular

    State of Utah v. Kelly Hansen : Brief of Respondent

    Get PDF
    BRIEF OF RESPONDENT APPEAL FROM CONVICTION OF POSSESSION OF A CONTROLLED SUBSTANCE WITH INTENT TO DISTRIBUTE FOR VALUE, A THIRD DEGREE FELONY, IN VIOLATION OF UTAH CODE ANN. § 58-37-8(1) ( a ) ( i i ) (1974) IN THE FOURTH JUDICIAL DISTRICT COURT, IN AND FOR UTAH COUNTY, STATE OF UTAH, THE HONORABLE GEORGE E. BALLIF, JUDGE, PRESIDING

    National Constitutions and Human Rights Issues in Africa

    Get PDF
    Philosophers such as Socrates, Plato, Aristotle, Hobbes, Locke and Marx, in the European context, and Dubois, Cabral, Fanon, and Ake, in the African political situation investigated and worked on modalities for constructing "the good political life" for human beings in a society with some success in the Occident and limited outcome in Africa. In the latter, the post-colonial period was marked by political competition over the control of the apparatus of power, the problems of human rights and political legitimacy, inter alia. Indeed, provisions were made in the constitution intended to assuage some of these conflictive problems. One such measure was the respect for human rights. The purpose of this essay is to show, concisely, how African governments have not always implemented human rights instruments contained in their constitutions, and to suggest ways that they might, in order to further stability in the area

    I&T Magazine No. 16, Winter 1994-95

    Get PDF

    I&T Magazine, Winter 1994-5

    Get PDF
    corecore