Sciweavers

68 search results - page 8 / 14
» Energy-Aware Tag Anti-Collision Protocols for RFID Systems
Sort
View
CTRSA
2008
Springer
110views Cryptology» more  CTRSA 2008»
13 years 8 months ago
RFID Security: Tradeoffs between Security and Efficiency
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
Ivan Damgård, Michael Østergaard Pede...
GLOBECOM
2009
IEEE
14 years 1 months ago
Randomized Multi-Channel Interrogation Algorithm for Large-Scale RFID Systems
— A radio frequency identification (RFID) system consists of a set of readers and several objects, equipped with small computer chips, called tags. In a dense RFID system, where...
Amir Hamed Mohsenian Rad, Vahid Shah-Mansouri, Vin...
CCS
2008
ACM
13 years 8 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 6 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
14 years 1 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine