Cryptography with cellular automata
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A new kind of science
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
Cryptography and authentication on RFID passive tags for apparel products
Computers in Industry
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
RFID traceability: a multilayer problem
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Radio frequency identification (RFID) tags can be affixed with every item to identify the objects without any visual or physical contact. At the same time, the use of the tags can have serious implications on new risks to security and privacy. Also, it is difficult to implement the cryptographic mechanisms into low-cost RFID tags. In this paper, we propose a cellular automata-based authentication mechanism suitable for low-cost RFID systems.