Sciweavers

36 search results - page 6 / 8
» An Efficient Tree-Based Tag Identification Protocol for RFID...
Sort
View
CTRSA
2008
Springer
110views Cryptology» more  CTRSA 2008»
13 years 8 months ago
RFID Security: Tradeoffs between Security and Efficiency
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
Ivan Damgård, Michael Østergaard Pede...
IWRT
2010
178views Communications» more  IWRT 2010»
13 years 4 months ago
CSMA Multi-stage Anti-collision Protocol for Active RFID Systems
Current anti-collision protocols for active RFID systems stem from the ISO-18000-7 standard, which selects Frame Slotted Aloha as the underlying Medium Access Control protocol. How...
Alejandro Palomo-López, M. Victoria Bueno-D...
WISTP
2010
Springer
13 years 4 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
EUC
2007
Springer
13 years 10 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
CSFW
2010
IEEE
13 years 9 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...