Abstract— In this survey we take a look at different approaches proposed in the literature for addressing the privacy and security issues derived from the Radio-Frequency IDenti...
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help iden...
The concept of grouping proofs has been introduced by Juels to permit RFID tags to generate a verifiable proof that they have been scanned simultaneously, even when readers or tags...
Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Sing...
Radio frequency identification (RFID) chips have been widely deployed in large-scale systems such as inventory control and supply chain management. While RFID technology has much...
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...