Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
RFID privacy issues and technical challenges
Communications of the ACM - Special issue: RFID
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Universally composable and forward-secure RFID authentication and authenticated key exchange
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A family of dunces: trivial RFID identification and authentication protocols
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Algebraic Attacks on RFID Protocols
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Anonymizer-Enabled Security and Privacy for RFID
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Private Interrogation of Devices via Identification Codes
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Privacy of recent RFID authentication protocols
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Traceable privacy of recent provably-secure RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Mutual authentication scheme for EPC tags- readers in the supply chain
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
New privacy results on synchronized RFID authentication protocols against tag tracing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Refresh: weak privacy model for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Lightweight privacy preserving authentication for RFID using a stream cipher
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
A new framework for RFID privacy
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Revisiting unpredictability-based RFID privacy models
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
On RFID privacy with mutual authentication and tag corruption
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Adaptable authentication model: exploring security with weaker attacker models
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
Lightweight RFID authentication with forward and backward security
ACM Transactions on Information and System Security (TISSEC)
"Who counterfeited my Viagra?" probabilistic item removal detection via RFID tag cooperation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Impossibility results for RFID privacy notions
Transactions on computational science XI
An almost-optimal forward-private RFID mutual authentication protocol with tag control
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Security analysis of two recently proposed RFID authentication protocols
Frontiers of Computer Science in China
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes
Wireless Personal Communications: An International Journal
Extending an RFID security and privacy model by considering forward untraceability
STM'10 Proceedings of the 6th international conference on Security and trust management
ROTIV: RFID ownership transfer with issuer verification
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
A pre-computable signature scheme with efficient verification for RFID
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
PUF-enhanced offline RFID security and privacy
Journal of Network and Computer Applications
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
A state-aware RFID privacy model with reader corruption
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
A zero-knowledge based framework for RFID privacy
Journal of Computer Security - ESORICS 2010
Hi-index | 0.00 |
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model to protocols which offer reader authentication to tags. Whenever corruption is allowed, we prove that secure protocols cannot protect privacy unless we assume tags have a temporary memory which vanishes by itself. Under this assumption, we study several protocols. We enrich a few basic protocols to get secure mutual authentication RFID protocols which achieve weak privacy based on pseudorandom functions only, narrow-destructive privacy based on random oracles, and narrow-strong and forward privacy based on public-key cryptography.