Sciweavers

2 search results - page 1 / 1
» Robust, anonymous RFID authentication with constant key-look...
Sort
View
CCS
2008
ACM
15 years 26 days ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
88
Voted
IJACT
2008
136views more  IJACT 2008»
14 years 11 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta