A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Techniques for Low Cost Authentication and Message Authentication
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
SEA: a scalable encryption algorithm for small embedded applications
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Low-Cost cryptography for privacy in RFID systems
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Noisy tags: a pretty good key exchange protocol for RFID tags
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
mCrypton – a lightweight block cipher for security of low-cost RFID tags and sensors
WISA'05 Proceedings of the 6th international conference on Information Security Applications
IEICE - Transactions on Information and Systems
A new automatic train identification system based on RFID
WISS'10 Proceedings of the 2010 international conference on Web information systems engineering
EMAP: An efficient mutual authentication protocol for passive RFID tags
International Journal of Automation and Computing
Hi-index | 0.00 |
The advantages and pitfalls of RFID deployment have gained much attention in academia and industry. While cryptography might offer a solution to many of the most pressing problems, the unique implementation demands of an RFID tag severely restrict the range of available options. In this article we review some of the issues involved.