Sciweavers

339 search results - page 13 / 68
» The Evolution of RFID Security
Sort
View
JCM
2007
101views more  JCM 2007»
13 years 8 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
CTRSA
2008
Springer
110views Cryptology» more  CTRSA 2008»
13 years 10 months ago
RFID Security: Tradeoffs between Security and Efficiency
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
Ivan Damgård, Michael Østergaard Pede...
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
14 years 18 days ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...
SEC
2007
13 years 10 months ago
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
Tieyan Li, Guilin Wang
ADHOCNOW
2009
Springer
13 years 9 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...