Sciweavers

1490 search results - page 46 / 298
» The Logic of Authentication Protocols
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
WISEC
2010
ACM
14 years 3 months ago
Low-cost untraceable authentication protocols for RFID
Yong Ki Lee, Lejla Batina, Dave Singelée, I...
CISIS
2009
IEEE
14 years 3 months ago
A Secure RFID Authentication Protocol with Low Communication Cost
Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko M...
ACISP
2009
Springer
14 years 3 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson