Authentication is one of the most basic and important cryptographic tasks. Mutual authentication protocols play a crucial role on the security of RFID systems. In this paper, we …
Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership transfer of RFID tags is also another …
S Cai, Y Li, T Li, RH Deng - Proceedings of the second ACM conference …, 2009 - dl.acm.org
In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to …
S Kardaş, S Celik, A Arslan, A Levi - … LightSec 2013, Gebze, Turkey, May 6 …, 2013 - Springer
Abstract R adio F requency ID entification (RFID) systems are getting pervasively deployed in many daily life applications. But this increased usage of RFID systems brings some …
D Kwon, D Han, J Lee, Y Yeom - International Conference on Embedded …, 2006 - Springer
In this paper, we analyze the security of the RFID authentication protocol proposed by Choi et al. at SecUbiq 2005. They claimed that their protocol is secure against all possible threats …
H Fernando, J Abawajy - … Networking, and Services: 7th International ICST …, 2012 - Springer
Out of the large number of RFID security protocols proposed in recent years none have proven to be truly secure and the creation of a truly secure security protocol for systems …
T Cao, P Shen - Int. J. Netw. Secur., 2009 - Citeseer
Radio frequency identification (RFID) technologies have many advantages in applications such as object tracking and monitoring, ticketing, supply-chain management, contactless …
P D'Arco, A De Santis - … 2008: First International Conference on Cryptology …, 2008 - Springer
In this paper we show weaknesses in SASI, a new Ultra-Lightweight RFID Authentication Protocol, designed for providing S trong A uthentication and S trong I ntegrity. We identify …
M Safkhani, N Bagheri, M Naderi… - Cryptology ePrint Archive, 2012 - eprint.iacr.org
Recently Lo et al. have proposed an ownership transfer pro-tocol for RFID objects using lightweight computing operators and claim their protocol provides stronger security …