Sciweavers

62 search results - page 12 / 13
» On the Security of Chien's Ultralightweight RFID Authenticat...
Sort
View
79
Voted
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 4 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
FC
2010
Springer
180views Cryptology» more  FC 2010»
14 years 10 months ago
Lighten Encryption Schemes for Secure and Private RFID Systems
We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precis...
Sébastien Canard, Iwen Coisel, Jonathan Etr...
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
15 years 1 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
CARDIS
2010
Springer
159views Hardware» more  CARDIS 2010»
15 years 27 days ago
Modeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only ...
Flavio D. Garcia, Peter van Rossum
ACSAC
2009
IEEE
15 years 4 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans