Sciweavers

72 search results - page 7 / 15
» Secure and Serverless RFID Authentication and Search Protoco...
Sort
View
123
Voted
CCS
2008
ACM
15 years 5 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
CISIS
2009
IEEE
15 years 10 months ago
A Secure RFID Authentication Protocol with Low Communication Cost
Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko M...
113
Voted
SACRYPT
2009
Springer
146views Cryptology» more  SACRYPT 2009»
15 years 10 months ago
More on the Security of Linear RFID Authentication Protocols
Matthias Krause, Dirk Stegemann
106
Voted
CIS
2006
Springer
15 years 7 months ago
Security and Privacy on Authentication Protocol for Low-Cost RFID
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang H...
122
Voted
EUC
2007
Springer
15 years 7 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...