Sciweavers

339 search results - page 8 / 68
» The Evolution of RFID Security
Sort
View
EUC
2007
Springer
14 years 2 months ago
Low-Cost and Strong-Security RFID Authentication Protocol
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronizati...
JaeCheol Ha, Sang-Jae Moon, Juan Manuel Gonz&aacut...
JSW
2008
122views more  JSW 2008»
13 years 8 months ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Tieyan Li, Guilin Wang, Robert H. Deng
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
14 years 2 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
14 years 9 days ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
ICFEM
2009
Springer
13 years 6 months ago
Improving Automatic Verification of Security Protocols with XOR
Abstract. K
Xihui Chen, Ton van Deursen, Jun Pang