Sciweavers

40 search results - page 4 / 8
» Refresh: Weak Privacy Model for RFID Systems
Sort
View
FC
2005
Springer
133views Cryptology» more  FC 2005»
14 years 1 months ago
RFID Traceability: A Multilayer Problem
Abstract. RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious im...
Gildas Avoine, Philippe Oechslin
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
14 years 1 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
CCS
2007
ACM
14 years 1 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
ESORICS
2009
Springer
14 years 2 months ago
Untraceable Tags Based on Mild Assumptions
Radio frequency identification (RFID) chips have been widely deployed in large-scale systems such as inventory control and supply chain management. While RFID technology has much...
Carlo Blundo, Angelo De Caro, Giuseppe Persiano
ICISC
2008
123views Cryptology» more  ICISC 2008»
13 years 9 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...