Sciweavers

191 search results - page 22 / 39
» Designing with RFID
Sort
View
EUC
2007
Springer
14 years 2 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
ICISC
2008
123views Cryptology» more  ICISC 2008»
13 years 11 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
SENSYS
2009
ACM
14 years 4 months ago
Wildlife and environmental monitoring using RFID and WSN technology
bstract: Wildlife and Environmental Monitoring using RFID and WSN Technology Vladimir Dyo1, Stephen A. Ellwood2, David W. Macdonald2, Andrew Markham3 Cecilia Mascolo4, Bence P´asz...
Vladimir Dyo, Stephen A. Ellwood, David W. Macdona...
IDEAS
2006
IEEE
110views Database» more  IDEAS 2006»
14 years 4 months ago
Towards Traceability across Sovereign, Distributed RFID Databases
Tracking and tracing individual items is a new and emerging trend in many industries. Driven by maturing technologies such as Radio-Frequency Identification (RFID) and upcoming s...
Rakesh Agrawal, Alvin Cheung, Karin Kailing, Stefa...
RFIDSEC
2010
13 years 8 months ago
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
In September 2009, David and Prasad proposed at MobiSec’09 an interesting new ultralightweight mutual authentication protocol for low-cost RFID tags. In this paper, we present a ...
Julio César Hernández Castro, Pedro ...