Sciweavers

11 search results - page 2 / 3
» Low-cost untraceable authentication protocols for RFID
Sort
View
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
13 years 9 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
13 years 11 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan
WISEC
2010
ACM
14 years 5 days ago
Low-cost untraceable authentication protocols for RFID
Yong Ki Lee, Lejla Batina, Dave Singelée, I...
PERCOM
2006
ACM
14 years 4 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
WISTP
2009
Springer
13 years 12 months ago
Algebraic Attacks on RFID Protocols
Abstract. This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concer...
Ton van Deursen, Sasa Radomirovic