acatech bezieht Position, Nr. 5; Berlin, April 2009. Neue Möglichkeiten ausloten, wie man Nutzer in die Ausgestaltung der Einsatzmöglichkeiten einbindet.
This device can do almost anything involving almost any kind of low-(~125 kHz) or high-(~13.56 MHz) frequency RFID tag. It can act as a reader. It can eavesdrop on a transaction between another reader and a tag. It can analyze the signal received over the air more closely, for example to perform an attack in which we derive information from the tag's instantaneous power consumption. It can pretend to be a tag itself. It is also capable of some less obviously useful operations that might come in handy for development work.
The RFID Security and Privacy Lounge references technical works related to security and privacy in RFID systems published in journals, conference proceedings, technical reports, thesis, eprints, and books. It is maintained and updated roughtly monthly by the UCL's Information Security Group in Belgium headed by Gildas Avoine.
Your RFID Superstore for RFID hardware featuring GEN2 UHF RFID equipment and integration services using Alien, Psion Teklogix, SIRIT, OMRON, Printronix, UPM Raflatac equipment.
RFDump is a backend GPL tool to directly interoperate with any RFID ISO-Reader to make the contents stored on RFID tags accessible. This makes the following types of audits possible:
* Test robustness of data-structures on the reader and the backend-application
* Proof-of-concept manipulations of RFID tag contents
* Clone / copy & paste User-Data stored on RFID tags
* Audit tag-security features
with during the event, ranked by the measured strengths of the interactions. On top of that, the system provides an interactive web-based visualization that allows users to browse their ego networks across all supported systems, exploring the interplay of face-to-face time, on-line friendships and shared interest. The system also provides simple forms of recommendation, by suggesting the closure of social triangles that span the supported networks: for example, if attendee A has spent face-to-face time with attendee B, the system can point her to the profile of a third attendee C who is a Facebook friend of both A and B, and hasn’t met A yet at the event.
The perfect shop for hackers, makers, coders and investors : open source hardware and highly hackable devices. Hackable:Devices aims to promote open hardware and its communities and offers a kind of social network to give them items to share their hacks.
P. Vorst, und A. Zell. European Robotics Symposium 2008, Volume 44/2008 von Springer Tracts in Advanced Robotics, Seite 273-282. Springer Berlin / Heidelberg, (Februar 2008)
V. Srinivasan, J. Stankovic, und K. Whitehouse. UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing, Seite 202--211. New York, NY, USA, ACM, (2008)