Sciweavers

9 search results - page 1 / 2
» Vulnerability analysis of RFID protocols for tag ownership t...
Sort
View
CN
2010
89views more  CN 2010»
13 years 7 months ago
Vulnerability analysis of RFID protocols for tag ownership transfer
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan...
COMCOM
2011
13 years 1 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
14 years 11 days ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
JCM
2007
143views more  JCM 2007»
13 years 6 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
JSW
2008
122views more  JSW 2008»
13 years 6 months ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Tieyan Li, Guilin Wang, Robert H. Deng