Sciweavers

1490 search results - page 46 / 298
» The Logic of Authentication Protocols
Sort
View
127
Voted
PERCOM
2006
ACM
16 years 3 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
109
Voted
WISEC
2010
ACM
15 years 10 months ago
Low-cost untraceable authentication protocols for RFID
Yong Ki Lee, Lejla Batina, Dave Singelée, I...
CISIS
2009
IEEE
15 years 10 months ago
A Secure RFID Authentication Protocol with Low Communication Cost
Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko M...
92
Voted
ACISP
2009
Springer
15 years 10 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson