Sciweavers

SOUPS
2009
ACM

Treat 'em like other devices: user authentication of multiple personal RFID tags

14 years 6 months ago
Treat 'em like other devices: user authentication of multiple personal RFID tags
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to control when a tag responds to queries by leveraging a mobile phone. The design and implementation of this approach is presented along with a study of its usability.
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
Added 28 May 2010
Updated 28 May 2010
Type Conference
Year 2009
Where SOUPS
Authors Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
Comments (0)