Sciweavers

52 search results - page 4 / 11
» Security Analysis of Two Ultra-Lightweight RFID Authenticati...
Sort
View
RFIDSEC
2010
13 years 5 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
13 years 10 months ago
An Optimal Non-interactive Message Authentication Protocol
Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SASbased non-interactive message aut...
Sylvain Pasini, Serge Vaudenay
AFRICACRYPT
2009
Springer
14 years 1 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
14 years 27 days ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 1 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang