with during the event, ranked by the measured strengths of the interactions. On top of that, the system provides an interactive web-based visualization that allows users to browse their ego networks across all supported systems, exploring the interplay of face-to-face time, on-line friendships and shared interest. The system also provides simple forms of recommendation, by suggesting the closure of social triangles that span the supported networks: for example, if attendee A has spent face-to-face time with attendee B, the system can point her to the profile of a third attendee C who is a Facebook friend of both A and B, and hasn’t met A yet at the event.
RFDump is a backend GPL tool to directly interoperate with any RFID ISO-Reader to make the contents stored on RFID tags accessible. This makes the following types of audits possible:
* Test robustness of data-structures on the reader and the backend-application
* Proof-of-concept manipulations of RFID tag contents
* Clone / copy & paste User-Data stored on RFID tags
* Audit tag-security features
Your RFID Superstore for RFID hardware featuring GEN2 UHF RFID equipment and integration services using Alien, Psion Teklogix, SIRIT, OMRON, Printronix, UPM Raflatac equipment.
The RFID Security and Privacy Lounge references technical works related to security and privacy in RFID systems published in journals, conference proceedings, technical reports, thesis, eprints, and books. It is maintained and updated roughtly monthly by the UCL's Information Security Group in Belgium headed by Gildas Avoine.
This device can do almost anything involving almost any kind of low-(~125 kHz) or high-(~13.56 MHz) frequency RFID tag. It can act as a reader. It can eavesdrop on a transaction between another reader and a tag. It can analyze the signal received over the air more closely, for example to perform an attack in which we derive information from the tag's instantaneous power consumption. It can pretend to be a tag itself. It is also capable of some less obviously useful operations that might come in handy for development work.
acatech bezieht Position, Nr. 5; Berlin, April 2009. Neue Möglichkeiten ausloten, wie man Nutzer in die Ausgestaltung der Einsatzmöglichkeiten einbindet.
C. Scholz, J. Illig, M. Atzmueller, and G. Stumme. 25th ACM Conference on Hypertext and Social Media (to appear), Santiago, Chile, September 1-4, ACM, (2014)
B. Macek, C. Scholz, M. Atzmueller, and G. Stumme. 23rd ACM Conference on Hypertext and Social Media, HT '12, page 245-254. Milwaukee, WI, USA, June 25-28, 2012, ACM, (2012)Best Paper.
A. Bekkali, H. Sanson, and M. Matsumoto. Wireless and Mobile Computing, Networking and Communications, 2007. WiMOB 2007. Third IEEE International Conference on, page 21 -21. (2007)