From identification to authentication–a review of RFID product authentication techniques

M Lehtonen, T Staake, F Michahelles - Networked RFID Systems and …, 2008 - Springer
Authentication has an important role in many RFID applications for providing security and
privacy. In this paper we focus on investigating how RFID can be used in product …

Survey on prominent RFID authentication protocols for passive tags

R Baashirah, A Abuzneid - Sensors, 2018 - mdpi.com
Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of
Things (IoT) to create an efficient and reliable system to securely identify objects in many …

The 5G-AKA authentication protocol privacy

A Koutsos - 2019 IEEE European symposium on security and …, 2019 - ieeexplore.ieee.org
We study the 5G-AKA authentication protocol described in the 5G mobile communication
standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions …

Shadow optimization from structured deep edge detection

L Shen, T Wee Chua, K Leman - Proceedings of the IEEE …, 2015 - openaccess.thecvf.com
We present a novel learning-based framework for shadow detection from a single image.
The local structure of shadow boundaries as well as the global interactions of the shadow …

LAMED—a PRNG for EPC class-1 generation-2 RFID specification

P Peris-Lopez, JC Hernandez-Castro… - Computer Standards & …, 2009 - Elsevier
RFID is a relatively heterogenous radio technology, where it is necessary to put an extra
effort on security and privacy-related issues. As early as 2004, some authors suggested the …

Protocols for RFID tag/reader authentication

S Piramuthu - Decision Support Systems, 2007 - Elsevier
Radio-Frequency Identification (RFID) tags are poised to supplant barcodes in the very near
future. Their information storage capacity as well as their ability to transfer information …

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems

R Doss, S Sundaresan, W Zhou - Ad Hoc Networks, 2013 - Elsevier
In this paper we propose a novel approach to authentication and privacy in mobile RFID
systems based on quadratic residues and in conformance to EPC Class-1 Gen-2 …

[图书][B] Security in RFID and sensor networks

P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …

Automated unbounded verification of stateful cryptographic protocols with exclusive OR

J Dreier, L Hirschi, S Radomirovic… - 2018 IEEE 31st …, 2018 - ieeexplore.ieee.org
Exclusive-or (XOR) operations are common in cryptographic protocols, in particular in RFID
protocols and electronic payment protocols. Although there are numerous applications, due …

A method for verifying privacy-type properties: the unbounded case

L Hirschi, D Baelde, S Delaune - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
In this paper, we consider the problem of verifying anonymity and unlinkability in the
symbolic model, where protocols are represented as processes in a variant of the applied pi …