Sciweavers

339 search results - page 14 / 68
» The Evolution of RFID Security
Sort
View
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 2 months ago
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
Abstract. Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate...
Gildas Avoine, Aslan Tchamkerten
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
15 years 8 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
102
Voted
DEXA
2007
Springer
96views Database» more  DEXA 2007»
15 years 8 months ago
Data Management in RFID Applications
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new c...
Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng C...
44
Voted
CCS
2009
ACM
15 years 6 months ago
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond
Karl Koscher, Ari Juels, Vjekoslav Brajkovic, Tada...
109
Voted
EUC
2006
Springer
15 years 5 months ago
A Scalable and Untraceable Authentication Protocol for RFID
RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduce...
Youngjoon Seo, Hyunrok Lee, Kwangjo Kim