Sciweavers

2 search results - page 1 / 1
» Robust, anonymous RFID authentication with constant key-look...
Sort
View
89
Voted
CCS
2008
ACM
15 years 2 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
103
Voted
IJACT
2008
136views more  IJACT 2008»
15 years 7 days ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta