PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Universally composable and forward-secure RFID authentication and authenticated key exchange
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Parallel and concurrent security of the HB and HB+ protocols
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
Expert Systems with Applications: An International Journal
Improvement of the RFID authentication scheme based on quadratic residues
Computer Communications
Expert Systems with Applications: An International Journal
RFID system for public train transportation
Security and Communication Networks
A minimum disclosure approach to authentication and privacy in RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.25 |
RFID, a core technology that can be used to create a ubiquitous society, is a non-contact recognition system in which a small chip attached to various types of products transmits and processes information regarding the product and the surrounding environment via wireless communication. As a wireless recognition technology, RFID consumes little power, is small, and allows one to communicate in virtually any environment. It is thus expected to be very convenient. However, due to these characteristics of RFID systems, it may also pose a serious threat to privacy. A number of studies are currently being conducted to address this problem. Most of these studies use secure communication channels between a database and a reader, and insecure communication channels between a reader and a tag. However, this paper proposes a secure authentication protocol to provide information to an authorized entity by applying recognition technology in an insecure communication channel even for the communication between the database and the reader.