Sciweavers

74 search results - page 1 / 15
» Algebraic Attacks on RFID Protocols
Sort
View
WISTP
2009
Springer
14 years 4 days ago
Algebraic Attacks on RFID Protocols
Abstract. This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concer...
Ton van Deursen, Sasa Radomirovic
JCM
2008
138views more  JCM 2008»
13 years 5 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
TDSC
2011
13 years 9 days ago
On the Security of Chien's Ultralightweight RFID Authentication Protocol
Recently, Chien proposed an ultralightweight RFID authentication protocol to prevent all possible attacks. However, we find two de-synchronization attacks to break the protocol. K...
Hung-Min Sun, Wei-Chih Ting, King-Hang Wang
JCM
2006
112views more  JCM 2006»
13 years 5 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 5 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem