Sciweavers

2363 search results - page 17 / 473
» How Secure is RFID
Sort
View
CCS
2008
ACM
15 years 6 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
AINA
2005
IEEE
15 years 9 months ago
Grouping Proof for RFID Tags
An RFID tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. The tag is used for management of goods and its distribution. Moreove...
Junichiro Saito, Kouichi Sakurai
143
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Impact of the correlation between forward and backscatter channels on RFID system performance
The channel of radio frequency identi cation (RFID) can be modeled as a cascaded channel consisting of a forward link and a backscatter link. The correlation between the forward a...
Chen He, Z. Jane Wang
111
Voted
CTRSA
2008
Springer
110views Cryptology» more  CTRSA 2008»
15 years 5 months ago
RFID Security: Tradeoffs between Security and Efficiency
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
Ivan Damgård, Michael Østergaard Pede...
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
15 years 7 months ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...