USENIXATC'10 Proceedings of the 2010 USENIX conference on USENIX annual technical conference
Video streaming security: reliable hash chain mechanism using redundancy codes
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Hash chain links resynchronization methods in video streaming security: performance comparison
Journal of Mobile Multimedia
Cryptanalysis of the RNTS system
The Journal of Supercomputing
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.