Sciweavers

64 search results - page 5 / 13
» Mutual authentication in RFID: security and privacy
Sort
View
ACISP
2008
Springer
14 years 1 months ago
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
Sebastian Gajek, Mark Manulis, Jörg Schwenk
CCS
2004
ACM
14 years 14 days ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
PERCOM
2006
ACM
14 years 6 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
ESORICS
2009
Springer
14 years 1 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
CIS
2006
Springer
13 years 10 months ago
Security and Privacy on Authentication Protocol for Low-Cost RFID
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang H...