Security and Privacy in Radio Frequency Identification

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=3gObauaOGos



Duration: 54:16
616 views
12


Radio Frequency Identification (RFID) refers to using tiny devices called tags to carry information about people or things. The technology offers great promise, with applications in everything from supply chain management to library book tracking to more convenient credit cards. Unfortunately, the technology also raises security and privacy problems. For example, without protections, it is possible to clone RFID tags and perform surreptitious tracking via RFID. I will discuss two approaches to solving these problems. The first uses cryptography, while the second leverages the Remote Attestation and Sealed Storage features of the Trusted Platform Module found in many of today's PCs. Joint work with Andrea Soppera (BT) and David Wagner (UC Berkeley).




Other Videos By Microsoft Research


2016-09-07A simple solution to the $k$-core problem
2016-09-07The Challenges of Development-through-Entrepreneurship: Research on Rural Computer Kiosks in India
2016-09-07The Elegant Solution: Toyota's Formula for Mastering Innovation
2016-09-07Lattice-Based Discriminative Training: Theory and Practice
2016-09-07Conference XP - Tutored Video Instruction With Conference XP and Classroom Presenter
2016-09-07Faster Decoding with Synchronous Grammars and n-gram Language Models
2016-09-07Locality and Phases: Dynamic Structures in Large-Scale Program Behavior
2016-09-07Inversion Transduction Grammar with Linguistic Constraints
2016-09-07How scheduling theory, scenarios, model checking and slicing can help in the verification of RTS
2016-09-07Innovention - the process of innovation and invention
2016-09-07Security and Privacy in Radio Frequency Identification
2016-09-07Conference XP - Automated Tracking of Student Behaviors
2016-09-07From Models to Systems: Applications of Model-based Design to Modern Large-Scale Systems
2016-09-07Splitting on Demand in Satisfiability Modulo Theories
2016-09-07Making Semiconductors Ferromagnetic: Reasons, Challenges, and Opportunities
2016-09-07Exploiting comparable corpora
2016-09-07Invisible Engines: How Software Platforms Drive Innovation        
2016-09-07Towards Documenting and Automating Collateral Evolutions in Linux Device Driver
2016-09-07Phonological Licensing of Grammatical Morphology in Early Speech
2016-09-07Purpose: The Starting Point of Great Companies          
2016-09-07Location, Time and Context in Systems: Rover - An Example



Tags:
microsoft research