Sciweavers

250 search results - page 7 / 50
» More on the Security of Linear RFID Authentication Protocols
Sort
View
IACR
2011
221views more  IACR 2011»
13 years 9 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
EJWCN
2010
118views more  EJWCN 2010»
14 years 4 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
CCS
2008
ACM
14 years 12 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
CISIS
2009
IEEE
15 years 4 months ago
A Secure RFID Authentication Protocol with Low Communication Cost
Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko M...
CIS
2006
Springer
15 years 1 months ago
Security and Privacy on Authentication Protocol for Low-Cost RFID
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang H...