Sciweavers

2363 search results - page 18 / 473
» How Secure is RFID
Sort
View
SEC
2007
15 years 5 months ago
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
Tieyan Li, Guilin Wang
154
Voted
ADHOCNOW
2009
Springer
15 years 5 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 4 months ago
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
Abstract. Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate...
Gildas Avoine, Aslan Tchamkerten
DEXA
2007
Springer
96views Database» more  DEXA 2007»
15 years 10 months ago
Data Management in RFID Applications
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new c...
Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng C...
57
Voted
CCS
2009
ACM
15 years 8 months ago
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond
Karl Koscher, Ari Juels, Vjekoslav Brajkovic, Tada...