Abstract. Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate...
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new c...
Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng C...
RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduce...