Lightweight mutual authentication and ownership transfer for RFID systems

L Kulseng, Z Yu, Y Wei, Y Guan - 2010 proceedings IEEE …, 2010 - ieeexplore.ieee.org
The promise of RFID technology has been evidently foreseeable due to the low cost and
high convenience value of RFID tags. However, the low-cost RFID tags poses new …

Privacy of recent RFID authentication protocols

K Ouafi, RCW Phan - Information Security Practice and Experience: 4th …, 2008 - Springer
Privacy is a major concern in RFID systems, especially with widespread deployment of
wireless-enabled interconnected personal devices eg PDAs and mobile phones, credit …

Privacy versus scalability in radio frequency identification systems

B Alomair, R Poovendran - Computer Communications, 2010 - Elsevier
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the
unique identification of such items over the wireless medium, without the need for a line-of …

Scalable RFID systems: a privacy-preserving protocol with constant-time identification

B Alomair, A Clark, J Cuellar… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
In RFID literature, most “privacy-preserving” protocols require the reader to search all tags in
the system in order to identify a single tag. In another class of protocols, the search …

[图书][B] Security in RFID and sensor networks

P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …

Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments

ME Hoque, F Rahman, SI Ahamed, JH Park - Wireless personal …, 2010 - Springer
One of the recent realms that gathered attention of researchers is the security issues of
Radio Frequency Identification (RFID) systems that have tradeoff between controlled costs …

[图书][B] Secure wireless sensor networks

M Conti - 2015 - Springer
Recent technology progress, particularly in the areas of computer networks and hardware
miniaturization, allowed the emergence of a set of novel computing and application …

Low-cost digital signature architecture suitable for radio frequency identification tags

M O'Neill, MJB Robshaw - IET Computers & Digital Techniques, 2010 - IET
Continuing achievements in hardware technology are bringing ubiquitous computing closer
to reality. The notion of a connected, interactive and autonomous environment is common to …

New mutual agreement protocol to secure mobile RFID-enabled devices

NW Lo, KH Yeh, CY Yeun - Information Security Technical Report, 2008 - Elsevier
The design of a secure communication scheme for Radio Frequency IDentification (RFID)
systems has been extensively studied in recent years in view of the awareness of individual …

An efficient ultralightweight authentication protocol for RFID systems

KH Yeh, NW Lo, E Winata - Radio Frequency Identification …, 2010 - ebooks.iospress.nl
Abstract Since Peris-Lopez et al. proposed the design of ultralightweight authentication
schemes [35–37] for low-cost RFID tags in 2006, research community has demonstrated a …