Author image not provided
 Stephen A Weis

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article44.50
Citation Count445
Publication count10
Publication years2002-2009
Available for download1
Average downloads per article1,609.00
Downloads (cumulative)1,609
Downloads (12 Months)65
Downloads (6 Weeks)7
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


10 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 10 of 10
Sort by:

1 published by ACM
November 2009 ACM Transactions on Information and System Security (TISSEC): Volume 13 Issue 1, October 2009
Publisher: ACM
Bibliometrics:
Citation Count: 22
Downloads (6 Weeks): 7,   Downloads (12 Months): 65,   Downloads (Overall): 1,609

Full text available: PDFPDF
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our contribution is twofold: (i) We propose a simple, formal definition of strong privacy useful for basic analysis of RFID systems, as well as a different (weaker) definition applicable to multiverifier systems; (ii) We apply our definition to ...
Keywords: RFID, EPC, privacy, proximity cards, security

2
May 2008 Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

An economic model of the online advertising market is presented, focusing on the effect of ad fraud. In the model, the market is comprised of three classes of players: publishers, advertising networks, and advertisers. The central question is whether ad networks have an incentive to aggressively combat fraud. The main ...

3
March 2007 PERCOMW '07: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 71

In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our contribution is twofold: (1) We propose a simple, formal definition of strong privacy useful for basic analysis of RFID systems, as well as a different (weaker) definition applicable to multi-verifier systems; and (2) We apply our definition ...
Keywords: RFID, privacy, security, EPC, proximity cards

4
September 2006 IEEE Security and Privacy: Volume 4 Issue 5, September 2006
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

The sixth annual Workshop on Privacy Enhancing Technologies (PET) was held in Cambridge, England, from 28-30 June 2006.
Keywords: multiparty computation, cryptography, privacy, cryptography, multiparty computation, Workshop on Privacy Enhancing Technologies (PET), Workshop on Privacy Enhancing Technologies (PET), privacy

5
June 2006 PET'06: Proceedings of the 6th international conference on Privacy Enhancing Technologies
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 15

We present an efficient construction of a private disjointness testing protocol that is secure against malicious provers and honest-but-curious (semi-honest) verifiers, without the use of random oracles. In a completely semi-honest setting, this construction implements a private intersection cardinality protocol. We formally define both private intersection cardinality and private disjointness ...
Keywords: private disjointness testing, anonymous login, private intersection cardinality, subgroup decision assumption, private data mining

6
January 2006
Bibliometrics:
Citation Count: 11

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these areas fall into one of two categories: efficient solutions lacking formal proofs of security or provably-secure, but highly inefficient solutions. This work ...

7
August 2005 CRYPTO'05: Proceedings of the 25th annual international conference on Advances in Cryptology
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 166

Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication resources necessary for most cryptographic authentication schemes. Surprisingly, low-cost pervasive devices like Radio Frequency Identification (RFID) tags share similar capabilities with another weak computing device: people. These ...
Keywords: learning parity with noise (LPN), RFID, authentication, humanaut, pervasive computing

8
March 2005 PERCOMW '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 11

Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly relevant examples of resource-constrained systems are low-cost Radio Frequency Identification (RFID) systems. Surprisingly, the computational abilities of low-cost pervasive devices like RFID tags are similar to another ...

9
March 2004 IEEE Security and Privacy: Volume 2 Issue 2, March 2004
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 2

Radio frequency identification devices (RFID) are at the center of much debate and controversy. Backers have hyped them as a godsend to supply-chain efficiency, while some privacy advocates have labeled RFID as the "worst thing that ever happened to consumer privacy."A group of technologists, industry proponents, academics, and privacy advocates ...

10
August 2002 CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 144

The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes. We describe RFID technology, summarize our approach and our research, and most importantly, describe the research opportunities in RFID for experts in cryptography and information security. The common theme in ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us