Sciweavers

2 search results - page 1 / 1
» Robust, anonymous RFID authentication with constant key-look...
Sort
View
75
Voted
CCS
2008
ACM
15 years 5 days ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
84
Voted
IJACT
2008
136views more  IJACT 2008»
14 years 10 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta