Analysis of the RFID security protocol for secure smart home network

HS Kim, JH Oh, JY Choi - 2006 International Conference on …, 2006 - ieeexplore.ieee.org
RFID (Radio Frequency Identification) has the potential to be efficiently used for object
identification and most likely a majority of items in the supply chain will carry RFID labels in …

Security analysis of RFID authentication for pervasive systems using model checking

HS Kim, JH Oh, JY Choi - 30th Annual International Computer …, 2006 - ieeexplore.ieee.org
Radio frequency identification (RFID) systems will soon become an important part of
everyday life. However, widespread deployment of RFID tags may create new threats to user …

A critical analysis of rfid security protocols

A Sharif, V Potdar - 22nd International Conference on …, 2008 - ieeexplore.ieee.org
RFID, Radio Frequency Identification Systems, have gains its popularity for automated
identification and supply chain applications. This paper describes the technical …

RFID system security analysis, response strategies and research directions

JS Cho, SC Kim, SS Yeo - 2011 IEEE Ninth International …, 2011 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) system is a contactless automatic identification
system using small, low-cost RFID tags. It enables recognition of the tag information via …

Security on RFID technology

N Kannouf, Y Douzi, M Benabdellah… - … Conference on Cloud …, 2015 - ieeexplore.ieee.org
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive
computing technologies in history due to their low cost and their broad applicability. Latest …

Experimental analysis of an RFID security protocol

Z Luo, T Chan, JS Li, E Wong… - … Conference on e …, 2006 - ieeexplore.ieee.org
Radio frequency identification (RFID) technology is expected to become a critical and
ubiquitous infrastructure technology of logistics and supply chain management (SCM) …

The vulnerabilities analysis and design of the security protocol for rfid system

HS Kim, JH Oh, JY Choi, JW Kim - The Sixth IEEE International …, 2006 - ieeexplore.ieee.org
Radio frequency identification (RFID) is expected to become an important and ubiquitous
infrastructure technology. However, this pervasive use of RFID tags opens up the possibility …

Security analysis of EPC-enabled RFID network

B Liu, CH Chu - 2010 IEEE International Conference on RFID …, 2010 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) is emerging as a popular technology for automatic
data collection and identification, which can be broadly applied to nearly everywhere, such …

A secure RFID mutual authentication protocol conforming to EPC class 1 generation 2 standard

CC Chang, WY Chen, TF Cheng - 2014 Tenth International …, 2014 - ieeexplore.ieee.org
RFID is a non-contact technology using radio frequencies to achieve automatic and unique
identification. It has been widely applied in various areas, such as access management, toll …

[PDF][PDF] Security framework for RFID-based applications in smart home environment

DM Konidala, DY Kim, CY Yeun… - Journal of Information …, 2011 - koreascience.kr
Abstract The concept of Smart-Homes is becoming more and more popular. It is anticipated
that Radio Frequency IDentification (RFID) technology will play a major role in such …