Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
bstract: Wildlife and Environmental Monitoring using RFID and WSN Technology Vladimir Dyo1, Stephen A. Ellwood2, David W. Macdonald2, Andrew Markham3 Cecilia Mascolo4, Bence P´asz...
Vladimir Dyo, Stephen A. Ellwood, David W. Macdona...
Tracking and tracing individual items is a new and emerging trend in many industries. Driven by maturing technologies such as Radio-Frequency Identification (RFID) and upcoming s...
Rakesh Agrawal, Alvin Cheung, Karin Kailing, Stefa...
In September 2009, David and Prasad proposed at MobiSec’09 an interesting new ultralightweight mutual authentication protocol for low-cost RFID tags. In this paper, we present a ...