Sciweavers

6 search results - page 1 / 2
» Scalable RFID security protocols supporting tag ownership tr...
Sort
View
COMCOM
2011
12 years 11 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
JCM
2007
143views more  JCM 2007»
13 years 4 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
13 years 10 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
EUC
2006
Springer
13 years 8 months ago
A Scalable and Untraceable Authentication Protocol for RFID
RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduce...
Youngjoon Seo, Hyunrok Lee, Kwangjo Kim
CCS
2008
ACM
13 years 6 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta