Sciweavers

32 search results - page 3 / 7
» Untangling RFID Privacy Models
Sort
View
INFOCOM
2010
IEEE
13 years 5 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
CARDIS
2010
Springer
159views Hardware» more  CARDIS 2010»
13 years 10 months ago
Modeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only ...
Flavio D. Garcia, Peter van Rossum
IACR
2011
121views more  IACR 2011»
12 years 6 months ago
Two RFID Privacy Models in Front of a Court
In ASIACRYPT 2007, Vaudenay proposed a comprehensive privacy model for unilateral RFID schemes. Soon after, in ASIACCS 2008, Paise and Vaudenay presented a new version of the cited...
Mohammad Hassan Habibi, Mohammad Reza Aref
ASIACRYPT
2007
Springer
14 years 1 months ago
On Privacy Models for RFID
Serge Vaudenay
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 7 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King