<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/341/Protecting-the-privacy-of-passive-RFID-tags">
		<rdfs:label><![CDATA[Protecting the privacy of passive RFID tags]]></rdfs:label>
		<pub:title><![CDATA[Protecting the privacy of passive RFID tags]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-09-01T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[Radio Frequency Identification (RFID) is an
emerging wireless technology with many potential applications,
including supply chain management, personnel
tracking and point-of-sale checkout. Its widespread
adoption raises concerns about known security and privacy
vulnerabilities, including the ability of rogue RFID readers
to access the unique identifier and data of RFID tags. To
prevent the eavesdropping of tags through communication
channel, methods like one-way hashing, cryptography and
one-time pads have been used; however, they do not
prevent the clandestine tracking of tags using their unique
identifier. We describe a novel scheme to protect the identity
of tags and prevent them from being clandestinely tracked
and inventoried.
<p>

Our approach uses inexpensive passive RFID tags, an
RFID reader, an authenticating agent, and a local entity
that can dynamically reprogram tags to protect their
identity. We ensure the visibility of goods to authorized RFID
readers at any point in the transit of RFID-tagged goods
from one location to another while denying information to
unauthorized readers. The approach protects the identity
of the RFID tags without significant changes to the existing
infrastructure and obviates the need for expensive, active
RFID tags. We present our scheme in the context of a
transit vehicle like a truck that carries RFID-tagged
goods from one place to another.]]></pub:abstract>
		<pub:note><![CDATA[TR CS-06-10]]></pub:note>
		<pub:organization><![CDATA[Computer Science and Electrical Engineering]]></pub:organization>
		<pub:counter>3517</pub:counter>
		<pub:tag><![CDATA[pervasive computing]]></pub:tag>
		<pub:tag><![CDATA[privacy]]></pub:tag>
		<pub:tag><![CDATA[rfid]]></pub:tag>
		<pub:tag><![CDATA[security]]></pub:tag>
		<pub:publisher><![CDATA[University of Maryland, Baltimore County]]></pub:publisher>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anand/Patwardhan"><person:name><![CDATA[Anand Patwardhan]]></person:name><rdfs:label><![CDATA[Anand Patwardhan]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest>							<rdf:List>
								<rdf:first>
									<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Nimish/Vartak"><person:name><![CDATA[Nimish Vartak]]></person:name><rdfs:label><![CDATA[Nimish Vartak]]></rdfs:label></person:Person>
								</rdf:first>
								<rdf:rest>									<rdf:List>
										<rdf:first>
											<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Paul/Nagy"><person:name><![CDATA[Paul Nagy]]></person:name><rdfs:label><![CDATA[Paul Nagy]]></rdfs:label></person:Person>
										</rdf:first>
										<rdf:rest>											<rdf:List>
												<rdf:first>
													<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
												</rdf:first>
												<rdf:rest rdf:resource="&rdf;nil" />
											</rdf:List>
										</rdf:rest>
									</rdf:List>
								</rdf:rest>
							</rdf:List>
						</rdf:rest>
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/330.pdf]]></pub:softCopyURI>
			<pub:softCopySize>55478</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:TechReport>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
