Sciweavers

2363 search results - page 35 / 473
» How Secure is RFID
Sort
View
ISW
2004
Springer
15 years 9 months ago
How to Break and Repair a Universally Composable Signature Functionality
Abstract. Canetti and Rabin recently proposed a universally composable ideal functionality FSIG for digital signatures. We show that this functionality cannot be securely realized ...
Michael Backes, Dennis Hofheinz
CSREASAM
2006
15 years 5 months ago
Do No Harm: The Use of RFID Tags in a Medical Environment
- With the increasing usage of RFID systems and their potential in a range of common applications especially medical related fields, it is important to investigate the weaknesses o...
Christopher Bolan
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 10 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
ISCAS
2006
IEEE
108views Hardware» more  ISCAS 2006»
15 years 10 months ago
An optimal normal basis elliptic curve cryptoprocessor for inductive RFID application
In this paper a 173-bit type II ONB ECC processor Section II introduces the mathematical backgrounds for for inductive RFID applications is described. Compared with curve operation...
Pak-Keung Leung, Oliver Chiu-sing Choy, Cheong-fat...
ICISC
2008
123views Cryptology» more  ICISC 2008»
15 years 5 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...