Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags

H Jannati, A Falahati - International Conference on e-Democracy, 2011 - Springer
Ownership transfer and grouping proof protocols are the two most important requirements
for RFID tag in various applications such as pharmaceutical distribution and manufacturing …

Achieving an appropriate security level for distance bounding protocols over a noisy channel

H Jannati, A Falahati - Telecommunication Systems, 2015 - Springer
A relay attack is probably the most popular assault that is normally executed over RFID
security protocols. To protect RFID systems against this attack, distance bounding protocols …

RFID light weight server-less search protocol based on nlfsrs

A Falahati, H Azizi, RM Edwards - 2016 8th International …, 2016 - ieeexplore.ieee.org
Spectacular expansion of RFID systems and applications by several industries such as
business, electronics, health, marketing, transportation, etc. has made RFID ever more …

Vulnerabilities of two recently RFID authentication protocols

N Chikouche, F Cherif… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
The communication channel between the tag and the reader in radiofrequency identification
technology (RFID) is unsecured, which makes it opened to logical attacks on authentication …

Algebraic replay attacks on authentication in RFID protocols

N Chikouche, F Cherif, M Benmohammed - International Conference on …, 2013 - Springer
One of the most important challenges related to RFID systems is the verification of security
proprieties in RFID authentication protocols. Among the important attacks in RFID systems …

Cryptanalysis of Flyweight RFID Authentication Protocol

T Vallent, EJ Yoon, H Kim - 대한전자공학회학술대회, 2012 - dbpia.co.kr
Recently, Burmester and Munilla proposed flyweight RFID authentication protocol, which is
an EPC-Gen2 compliant protocol. The protocol uses synchronized pseudorandom number …

Full Secret Disclosure Attack against an EPC-C1 G2 Compliant Authentication Protocol

M Safkhani - Journal of Computing and Security, 2019 - jcomsec.ui.ac.ir
Security analysis of a protocol is an important step toward the public trust on its security.
Recently, in 2018, Moradi et al. considered the security of the Wei and Zhang RFID EPC-C1 …

Problèmes de sécurité dans les systèmes embarqués

N CHIKOUCHE - 2016 - thesis.univ-biskra.dz
Les systèmes d'identification par radiofréquence (RFID) sont des systèmes embarqués qui
ont connu des développements rapides dans les dernières années. Ces systèmes sont …

Improved Flyweight RFID Authentication Protocol

TF Vallent, EJ Yoon, H Kim - IEIE Transactions on Smart …, 2012 - koreascience.kr
The widespread implementation of RFID in ubiquitous computing is constrained
considerably by privacy and security unreliability of the wireless communication channel …

[引用][C] An authentication with key agreement scheme for a mobile satellite communication system

A Sayyah, SA Akbari