Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1369)
- Environmental Sciences (1027)
- Physics (870)
- Engineering (762)
- Chemistry (692)
-
- Life Sciences (595)
- Earth Sciences (528)
- Mathematics (475)
- Social and Behavioral Sciences (422)
- Computer Engineering (320)
- Statistics and Probability (298)
- Oceanography and Atmospheric Sciences and Meteorology (243)
- Astrophysics and Astronomy (216)
- Geology (206)
- Electrical and Computer Engineering (204)
- Natural Resources Management and Policy (167)
- Applied Mathematics (165)
- Databases and Information Systems (150)
- Natural Resources and Conservation (149)
- Education (148)
- Environmental Health and Protection (147)
- Physical Chemistry (136)
- Information Security (117)
- Materials Science and Engineering (116)
- Environmental Monitoring (113)
- Water Resource Management (105)
- Medicine and Health Sciences (101)
- Plant Sciences (94)
- Law (90)
- Institution
-
- University of Nebraska - Lincoln (699)
- University of Wollongong (344)
- Wright State University (228)
- TÜBİTAK (218)
- Selected Works (167)
-
- University of Nevada, Las Vegas (146)
- Missouri University of Science and Technology (142)
- Brigham Young University (127)
- Singapore Management University (120)
- University of Kentucky (109)
- William & Mary (105)
- SelectedWorks (104)
- Louisiana State University (103)
- COBRA (101)
- Old Dominion University (101)
- California Polytechnic State University, San Luis Obispo (96)
- Edith Cowan University (93)
- Chinese Chemical Society | Xiamen University (89)
- Air Force Institute of Technology (88)
- University of Tennessee, Knoxville (75)
- Embry-Riddle Aeronautical University (73)
- Portland State University (72)
- Utah State University (71)
- Georgia State University (70)
- University of Central Florida (69)
- Dartmouth College (68)
- University of Massachusetts Amherst (66)
- Washington University in St. Louis (62)
- The University of Maine (59)
- University of Texas at Arlington (56)
- Keyword
-
- College for Professional Studies (51)
- MS Computer and Information Technology (47)
- School of Computer & Information Science (43)
- Regis University MSCIT thesis (31)
- Research and Technical Reports (30)
-
- Algorithms (26)
- Mathematics (26)
- Physics (26)
- Outdoor education (25)
- Data (24)
- Management (23)
- CMMB (22)
- GIS (22)
- Western Australia (22)
- Security (21)
- GeoQUEST (18)
- [RSTDPub] (18)
- For (17)
- Water quality (17)
- Chesapeake Bay (16)
- Education (16)
- Groundwater (16)
- Privacy (16)
- Synthesis (16)
- United States (15)
- Agriculture (14)
- Chemistry (14)
- Conservation (14)
- Engineering (14)
- Shoreline Inventories (14)
- Publication
-
- Faculty of Informatics - Papers (Archive) (220)
- Theses and Dissertations (211)
- Computer Science & Engineering Syllabi (156)
- Research Collection School Of Computing and Information Systems (114)
- Electronic Theses and Dissertations (102)
-
- Faculty of Science - Papers (Archive) (97)
- Journal of Electrochemistry (89)
- Faculty Publications (83)
- United States Department of Agriculture Wildlife Services: Staff Publications (80)
- Turkish Journal of Chemistry (78)
- All Computer Science and Engineering Research (62)
- Dartmouth Scholarship (55)
- Turkish Journal of Physics (55)
- LSU Doctoral Dissertations (53)
- Regis University Student Publications (comprehensive collection) (51)
- Physics Faculty Research & Creative Works (50)
- Doctoral Dissertations (49)
- LSU Master's Theses (48)
- United States Geological Survey: Staff Publications (48)
- Reports (45)
- Physics (44)
- Masters Theses (43)
- Publications (43)
- Kenneth Bloom Publications (42)
- Dissertations (41)
- Thai Environment (41)
- Chemistry Faculty Publications (40)
- Physics Faculty Publications (40)
- Bird Strike Committee-USA/Canada Joint Annual Meeting: 8th (2006) (39)
- Theses Digitization Project (37)
- Publication Type
Articles 91 - 120 of 5872
Full-Text Articles in Physical Sciences and Mathematics
Managing Product Line Asset Bases, John Hunt
Managing Product Line Asset Bases, John Hunt
All Dissertations
Product lines are predicated on collecting assets common to the desired product portfolio, commonly known as the asset base. For many product lines, the size of asset base has become large enough to create a variety of difficulties. The techniques for managing large product line asset bases are unaddressed in the literature.
This research presents new techniques that take advantage of asset base characteristics, unavailable in more general collections, to both reduce the number of assets and to organize the asset base that go beyond what is possible with other software collections. The result is an asset base that is …
Characterization Of Capillary-Channeled Polymer Fibers As Stationary Phases For High-Performance Liquid Chromatography Of Macromolecules, Dwella Nelson
All Dissertations
Capillary-channeled polymer (C-CP) fibers are being developed and characterized as high-performance liquid chromatography (HPLC) stationary phases for reversed-phase separations of proteins. Conventional porous phases are not well suited for separating large macromolecules due to the slow diffusivity of the molecules, large diffusional distances, and stagnant mobile phase zones within the column. Stationary phases are continually being developed to address the challenges associated with HPLC of proteins and other macromolecules in general. C-CP fiber stationary phases are an alternative to conventional bead technology and offer a variety of chemical and physical advantages. The fibers can be selected for their chemical functionality …
Asymmetric Games For Convolution Systems With Applications To Feedback Control Of Constrained Parabolic Equations, Boris S. Mordukhovich
Asymmetric Games For Convolution Systems With Applications To Feedback Control Of Constrained Parabolic Equations, Boris S. Mordukhovich
Mathematics Research Reports
The paper is devoted to the study of some classes of feedback control problems for linear parabolic equations subject to hard/pointwise constraints on both Dirichlet boundary controls and state dynamic/output functions in the presence of uncertain perturbations within given regions. The underlying problem under consideration, originally motivated by automatic control of the groundwater regime in irrigation networks, is formalized as a minimax problemof optimal control, where the control strategy is sought as a feedback law. Problems of this type are among the most important in control theory and applications - while most challenging and difficult. Based on the Maximum Principle …
Structural Study Of Mn-Doped Zno Fi Lms By Tem, Xingzhong Li, Jun Zhang, David J. Sellmyer
Structural Study Of Mn-Doped Zno Fi Lms By Tem, Xingzhong Li, Jun Zhang, David J. Sellmyer
David Sellmyer Publications
The structural study of diluted magnetic semiconductors is important for interpreting the ferromagnetic behavior associated with the materials. In the present work, a series of low concentration Mn-doped ZnO thin films synthesized by pulsed laser deposition was studied by electron microscopy. All films show the wurtzite structure with (001) preferred growth orientation on the Si substrate. Electron diffraction experiments indicate the deterioration of the growth orientation in some areas of the films with increasing Mn concentration, and the existence of a secondary phase, of Mn2O3-type, in the films with larger Mn concentrations. High-resolution electron microscopy images …
Living In A Land Of Fire, R. J. Whelan, P. Kanowski, M. Gill, A. Andersen
Living In A Land Of Fire, R. J. Whelan, P. Kanowski, M. Gill, A. Andersen
Faculty of Science - Papers (Archive)
Fires are an inherent part of the Australian environment. They cannot be prevented, but the risks they pose — to life, health, property and infrastructure, production systems, and to environment values — can be minimised through systematic evaluation and strategic planning and management. Fires have a fundamental and irreplaceable role in sustaining many of Australia’s natural ecosystems and ecological processes, and they are a valuable tool for achieving many land management objectives. However, if they are too frequent or too infrequent, too severe or too mild, or mistimed, they can erode ecosystem ‘health’ and biodiversity and compromise other land management …
Qos Multimedia Multicast Routing: A Component Based Primal Dual Approach, Faheem Akhtar Hussain
Qos Multimedia Multicast Routing: A Component Based Primal Dual Approach, Faheem Akhtar Hussain
Computer Science Theses
The QoS Steiner Tree Problem asks for the most cost efficient way to multicast multimedia to a heterogeneous collection of users with different data consumption rates. We assume that the cost of using a link is not constant but rather depends on the maximum bandwidth routed through the link. Formally, given a graph with costs on the edges, a source node and a set of terminal nodes, each one with a bandwidth requirement, the goal is to find a Steiner tree containing the source, and the cheapest assignment of bandwidth to each of its edges so that each source-to-terminal path …
College Of Engineering Senior Design Competition Fall 2006, University Of Nevada, Las Vegas
College Of Engineering Senior Design Competition Fall 2006, University Of Nevada, Las Vegas
Fred and Harriet Cox Senior Design Competition Projects
Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge.
The senior design competition helps to focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects …
Collisions Of Red-Tailed Hawks (Buteo Jamaicensis), Turkey Vultures (Cathartes Aura), And Black Vultures (Coragyps Atratus) With Aircraft: Implications For Bird Strike Reduction, Bradley F. Blackwell, Sandra E. Wright
Collisions Of Red-Tailed Hawks (Buteo Jamaicensis), Turkey Vultures (Cathartes Aura), And Black Vultures (Coragyps Atratus) With Aircraft: Implications For Bird Strike Reduction, Bradley F. Blackwell, Sandra E. Wright
United States Department of Agriculture Wildlife Services: Staff Publications
From 1990 through 2003, 52,493 wildlife collisions with aircraft were reported to the U.S. Federal Aviation Administration (FAA); 97% of these incidents involved birds. The approximate cost to the civil aviation industry in the U.S.A. due to collisions of birds with aircraft (hereafter referred to as bird strikes) was $163.51 million in direct monetary losses and associated costs for the 14 year period (Cleary et al. 2004). Strikes with raptors (Falconidae and Accipitridae; including vultures, Cathartidae)accounted for approximately 28% of reported aircraft down time resulting from known-species bird strikes (known species =182942 hr; total for all birds = 244510 hr) …
Analyzing The Effects Of Adolescent Risky Behaviors On Suicidal Ideation, Marchelle Elizabeth Sanchez
Analyzing The Effects Of Adolescent Risky Behaviors On Suicidal Ideation, Marchelle Elizabeth Sanchez
Mathematics Theses
This study is an analysis of adolescent risk behaviors contributing to an increased rate of suicidal ideation for 12 to 18 year olds. The Youth Risk Behavior Surveillance System Survey (YRBSS) is an epidemiologic survey designed to monitor the prevalence of risky behaviors of adolescents in middle and high school1. The YRBSS is a complex sample survey with a three-stage cluster design. Multiple logistic regression is used to analyze the data, including methods of analysis to address issues in complex survey design. Results of this study indicate several different risk factors that influence the rate of suicidal ideation among adolescents, …
Modified Control Software For Imaging Ultracold Atomic Clouds, Dwight L. Whitaker, A. Sharma, J. M. Brown
Modified Control Software For Imaging Ultracold Atomic Clouds, Dwight L. Whitaker, A. Sharma, J. M. Brown
Pomona Faculty Publications and Research
A charge-coupled device (CCD) camera capable of taking high-quality images of ultracold atomic samples can often represent a significant portion of the equipment costs in atom trapping experiment. We have modified the commercial control software of a CCD camera designed for astronomical imaging to take absorption images of ultracold rubidium clouds. This camera is sensitive at 780 nm and has been modified to take three successive 16-bit images at full resolution. The control software can be integrated into a Matlab graphical user interface with fitting routines written as Matlab functions. This camera is capable of recording high-quality images at a …
Outsourcing: The Security Risk Management Challenge, Carl Colwill
Outsourcing: The Security Risk Management Challenge, Carl Colwill
Australian Information Security Management Conference
The globalisation of business and the growth of the digital networked economy means that virtually any business process can be undertaken by someone else, somewhere in the world. To achieve business transformation within the UK Information and Communication Technology (ICT) sector, BT is taking a strategic approach to outsourcing: this has resulted in a rapid and substantial increase in the outsourcing and offshoring of ICT development, maintenance and support contracts. Each and every outsourcing decision could have major security, legal, regulatory and contractual impacts. It is generally recognised that risks are likely to be compounded when outsourcing to companies based …
Information Security Management And Virtual Collaboration: A Western Australian Perspective, Rosanna Fanciulli
Information Security Management And Virtual Collaboration: A Western Australian Perspective, Rosanna Fanciulli
Australian Information Security Management Conference
This paper presents an ongoing case study into stakeholder perceptions regarding information security management systems in emergent organisations operating in Western Australia. It takes a socio-political perspective on the problem of how to manage simultaneously virtual collaboration and information security management. A literature review introduces the context and history of the research. In light of this, it is proposed that social and political issues need to be researched and addressed before many of the existing technological strategies for information security will succeed. The research project is then outlined and the design and preliminary results presented. The results point to a …
Social Engineering And Its Impact Via The Internet, Matthew J. Warren, Shona Leitch
Social Engineering And Its Impact Via The Internet, Matthew J. Warren, Shona Leitch
Australian Information Security Management Conference
Historically social engineering attacks were limited upon a single organisation or single individual at a time. The impact of the Internet and growth of E-Business has allowed social engineering techniques to be applied at a global level. The paper will discuss how new social engineering techniques are being applied and puts forward a conceptual model to allow an understanding of how social engineering attacks are planned and implemented against E-Business activities.
Secure Transmission Of Shared Electronic Health Records: A Review, Rachel J. Mahncke, Patricia A. Williams
Secure Transmission Of Shared Electronic Health Records: A Review, Rachel J. Mahncke, Patricia A. Williams
Australian Information Security Management Conference
Paperbased health records together with electronic Patient Management Systems remain the norm for hospitals and primary care practices to manage patient health information in Australia. Although the benefits of recording patient health information into an electronic format known as an electronic health record (EHR) are well documented, the use of these systems has not yet been fully realised. The next advancement for EHRs is the ability to share health records for the primary purpose of improved patient care. This may for example enable a primary care physician, with the patient’s consent, to electronically share pertinent health information with a specialist, …
Simple, Robust And Accurate Head-Pose Tracking Using A Single Camera, Simon Meers, Koren Ward, Ian Piper
Simple, Robust And Accurate Head-Pose Tracking Using A Single Camera, Simon Meers, Koren Ward, Ian Piper
Faculty of Informatics - Papers (Archive)
This paper describes an inexpensive, robust method for tracking the head position and orientation of the user by using a single low-cost USB camera and infrared light emitting diodes concealed within spectacle frames worn by the user. Unlike gaze and head-pose tracking systems which rely on high-resolution stereo cameras and complex image processing hardware and software to find and track facial features on the user, the proposed system is able to efficiently locate and track the head's orientation and distance relative to the camera with little processing. Due to the infrared light emitting diodes having fixed geometry, the system does …
Cyber Crime And Biometric Authentication – The Problem Of Privacy Versus Protection Of Business Assets, Michael G. Crowley
Cyber Crime And Biometric Authentication – The Problem Of Privacy Versus Protection Of Business Assets, Michael G. Crowley
Australian Information Security Management Conference
Cyber crime is now a well recognised international problem that is a major issue for anyone who runs, manages, owns, uses or accesses computer systems linked to the worldwide web. Computer systems are business assets. Personal biometric information is also an asset. Studies have shown that privacy concerns represent a key hurdle to the successful introduction of biometric authentication. In addition, terrorist activity and the resultant legislation have added an additional risk factor businesses need to take into account if they propose using biometric authentication technology. This paper explores the use of biometric authentication to protect business and individual assets. …
Managing Information Security Complexity, Murray Brand
Managing Information Security Complexity, Murray Brand
Australian Information Security Management Conference
This paper examines using a requirements management tool as a common thread to managing the complexity of information security systems. Requirements management provides a mechanism to trace requirements through to design, implementation, operating, monitoring, reviewing, testing, and reporting by creating links to associated, critical artefacts. This is instrumental in managing complex and dynamic systems where change can impact other subsystems and associated documentation. It helps to identify the affected artefacts through many layers. Benefits to this approach would include better project planning and management, improved risk management, superior change management, ease of reuse, enhanced quality control and more effective acceptance …
Risks And Responsibilities In Establishing A Wireless Network For An Educational Institution, Leigh Knights, Matt Fonceca, Georgina Mack, Andrew Woodward
Risks And Responsibilities In Establishing A Wireless Network For An Educational Institution, Leigh Knights, Matt Fonceca, Georgina Mack, Andrew Woodward
Australian Information Security Management Conference
A wireless network solution is generally implemented when the bounds of walls of buildings and the constraints of wires need to be broken. Wireless technologies provide the potential for freedom of mobility which is undoubtedly a convenience for organisations in today’s market. The security of a wireless network is crucial for data integrity, especially when the data is not secured by the insulation of wires. While data is being transferred across a wireless network, it is vulnerable. There is no room for error, neglect or ignorance from an organisation, as a breech of data integrity can be devastating for both …
An Assessment Of Threats Of The Physical And Mac Address Layers In Wimax/802.16, Krishnun Sansurooah
An Assessment Of Threats Of The Physical And Mac Address Layers In Wimax/802.16, Krishnun Sansurooah
Australian Information Security Management Conference
This paper investigates the risks and vulnerabilities associated to the security of the WiMAX/802.16 broadband wireless technology. One of the other aspects of this document will be to review all the associated weaknesses to the Medium Access Control (MAC) layer and at the physical (PHY) layer. The risks and impacts are assessed according to a systematic approach. The approach or methodology is used is according to the European Telecommunication Standards Institute (ETSI). These threats are enumerated and classified accordingly to their risk levels.
The Reality Of Risks From Consented Use Of Usb Devices, Marwan Al-Zarouni
The Reality Of Risks From Consented Use Of Usb Devices, Marwan Al-Zarouni
Australian Information Security Management Conference
Physical security is considered an integral part of information systems security. The idea that small devices pose a security threat for enterprises is well established. On the other hand, consented and supervised access to USB ports via USB flash drives is sometimes allowed. This paper will highlight the risk associated with this kind of access by devices such as IPods and USB flash drives. It will show a proof of concept USB device that runs automatically once connected to a personal computer and copies files and folders from the victim's computer to its storage and executes potentially harmful code on …
Security Issues Of Ieee 802.16 (Wimax), Jamshed Hasan
Security Issues Of Ieee 802.16 (Wimax), Jamshed Hasan
Australian Information Security Management Conference
Worldwide Interoperability for Microwave Access (WiMAX) is going to be an emerging wireless technology for the future. With the increasing popularity of Broadband internet, wireless networking market is thriving. Wireless network is not fully secure due to rapid release of new technologies, market competition and lack of physical infrastructure. In the IEEE 802.11 technology, security was added later. Iin IEEE 802.16, security has been considered as the main issue during the design of the protocol. However, security mechanism of the IEEE 802.16 (WiMAX) still remains a question. WiMAX is relatively a new technology; not deployed widely to justify the evidence …
Telemedicine And The Digital Door Doctor, Darren Webb, Patricia A. Williams
Telemedicine And The Digital Door Doctor, Darren Webb, Patricia A. Williams
Australian Information Security Management Conference
Telemedicine is changing the way medicine can be practiced, and how medical knowledge is communicated, learnt and researched in today’s technologically oriented society. The adoption of internet based communication has significantly expanded the patients’ ability to access a multitude of world class medical information. Research has shown that patients would welcome the ability to consult a doctor using the same computing tools they use to communicate with family, friends and work colleagues. This paper discusses the use of telemedicine today and how it could be used to access medical services from home. Further, it investigates the incentives and barriers to …
Uncontrollable Privacy - The Right That Every Attacker Desires, Giannakis Antoniou, Stefanos Gritzalis
Uncontrollable Privacy - The Right That Every Attacker Desires, Giannakis Antoniou, Stefanos Gritzalis
Australian Information Security Management Conference
The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs). Among the Internet users, there are attackers who desire more than anything else to enjoy privacy during their malicious actions, and a PET is what they were looking for. Thus, although a PET should offer privacy to the internet users, proper techniques should also be employed in order to help the victims during the investigation procedure and unveil the identification of the attackers. The paper summarizes the current design …
A Knowledge Framework For Information Security Modeling, Shuangyan Liu, Ching-Hang Cheung, Lam-For Kwok
A Knowledge Framework For Information Security Modeling, Shuangyan Liu, Ching-Hang Cheung, Lam-For Kwok
Australian Information Security Management Conference
The data collection process for risk assessment highly depends on the security experience of security staffs of an organization. It is difficult to have the right information security staff, who understands both the security requirements and the current security state of an organization and at the same time possesses the skill to perform risk assessment. However, a well defined knowledge model could help to describe categories of knowledge required to guide the data collection process. In this paper, a knowledge framework is introduced, which includes a knowledge model to define the data skeleton of the risk environment of an organization …
The Derivation Of A Conceptual Model For It Security Outsourcing, W D. Wilde, M J. Warren, W Hutchinson
The Derivation Of A Conceptual Model For It Security Outsourcing, W D. Wilde, M J. Warren, W Hutchinson
Australian Information Security Management Conference
IT security outsourcing is the establishment of a contractual relationship between an organization with an outside vendor which assumes responsibility for the organisation’s security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making process leads to a substantial degree of uncertainty. This is especially so in the realm of IS security since the protection of both hardware and software systems is placed in the hands of an external provider. This paper is a fuller and more comprehensive paper of a previous paper outlining the effectiveness of the decision making process by …
The Implementation Of E-Mail Content Management In A Large Corporation, Michael Hansen, Craig Valli
The Implementation Of E-Mail Content Management In A Large Corporation, Michael Hansen, Craig Valli
Australian Information Security Management Conference
It is a well known fact that while Email is a valuable tool to any business that it has also become the main cause in the distribution of viruses, worms and other malware. Further to this is the real threat of spyware that can affect performance on computers, phishing schemes that can cheat employees into giving up valuable information, such as passwords, using social engineering and the timeconsuming and costly effect of spam to a corporate network. This paper will analyse and show the effect of a successful implementation of Email filtering software in a large corporation, together with some …
Qos Issues Of Using Probabilistic Non-Repudiation Protocol In Mobile Ad Hoc Network Environment, Yi-Chi Lin, Jill Slay
Qos Issues Of Using Probabilistic Non-Repudiation Protocol In Mobile Ad Hoc Network Environment, Yi-Chi Lin, Jill Slay
Australian Information Security Management Conference
So as to guarantee the fairness of electronic transactions, users may require a NonRepudiation (NR) service in any type of network. However, most existing NR protocols cannot work properly in a Mobile Ad hoc Network (MANET) due to their characteristics (e.g. limited resources and lack of central authority). The design of the Probabilistic NonRepudiation Protocol (PNRP) is comparatively suitable for the nature of a MANET, but it still poses some QoS issues. This article points out the QoS issues which are caused by using PNRP in a MANET environment. These issues explain the difficult of performing PNRP in such an …
Does Your Wireless Lan Have Criminal Intent?, Michael Crowley, Andrew Woodward
Does Your Wireless Lan Have Criminal Intent?, Michael Crowley, Andrew Woodward
Australian Information Security Management Conference
All of the literature relating to wireless network security has focused on the flaws, newer alternatives and suggestions for securing the network. There is much speculation and anecdotal statements in relation to what can happen if a breach occurs, but this is mostly from a computer security perspective, and mostly expressed in terms of potential for financial loss. This paper examines the potential legal ramifications of failing to properly secure a wireless network. Several scenarios are examined within based on usage of wireless on the various category of attack. Legal opinion, backed up with case law, is provided for each …
The Information Security Ownership Question In Iso/Iec 27001 – An Implementation, Lizzie Coles-Kemp, Richard E. Overill
The Information Security Ownership Question In Iso/Iec 27001 – An Implementation, Lizzie Coles-Kemp, Richard E. Overill
Australian Information Security Management Conference
The information security management standard ISO/IEC 27001 is built on the notion that information security is driven by risk assessment and risk treatment. Fundamental to the success of risk assessment and treatment is the decision making process that takes risk assessment output and assigns decisions to this output in terms of risk treatment actions. It is argued that the effectiveness of the management system lies in its ability to make effective, easytoimplement and measurable decisions. One of the key issues in decision making is ownership. In this paper two aspects of information security ownership are considered: ownership of the asset …
The Lazarus Effect: Resurrecting Killed Rfid Tags, Christopher Bolan
The Lazarus Effect: Resurrecting Killed Rfid Tags, Christopher Bolan
Australian Information Security Management Conference
Several RFID Standards allow RFID Tags to be ‘killed’ using a specialised command code. ‘Killed’ RFID Tags should be irrevocably deactivated. In actuality, when a valid kill command is sent to a tag four sections of the tags management data are zeroed causing the tag to enter a ‘fault state’ and thus be ignored by RFID readers. Through the reinitialisation of these four sections to valid values it was discovered that a tag could be resurrected and function normally.