Sciweavers

62 search results - page 1 / 13
» On the security of the Algebraic Eraser tag authentication p...
Sort
View
JSW
2008
122views more  JSW 2008»
13 years 4 months ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Tieyan Li, Guilin Wang, Robert H. Deng
COMCOM
2011
12 years 12 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
TWC
2008
170views more  TWC 2008»
13 years 4 months ago
Secure and Serverless RFID Authentication and Search Protocols
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID proto...
Chiu Chiang Tan, Bo Sheng, Qun Li
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
13 years 11 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan
EUC
2007
Springer
13 years 11 months ago
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System
This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The prop...
JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae M...