Sciweavers

22 search results - page 1 / 5
» A Highly Scalable RFID Authentication Protocol
Sort
View
ACISP
2009
Springer
14 years 5 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson
CCS
2008
ACM
14 years 1 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
COMCOM
2011
13 years 6 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
EUC
2006
Springer
14 years 2 months ago
A Scalable and Untraceable Authentication Protocol for RFID
RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduce...
Youngjoon Seo, Hyunrok Lee, Kwangjo Kim
CCS
2007
ACM
14 years 5 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros