This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronizati...
JaeCheol Ha, Sang-Jae Moon, Juan Manuel Gonz&aacut...
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...