Simple forward-secure signatures from any signature scheme
Proceedings of the 7th ACM conference on Computer and communications security
GSM and Personal Communications Handbook
GSM and Personal Communications Handbook
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Severless Search and Authentication Protocols for RFID
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Mutual authentication in RFID: security and privacy
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Scalable privacy protecting scheme through distributed RFID tag identification
Proceedings of the workshop on Applications of private and anonymous communications
Universally Composable RFID Identification and Authentication Protocols
ACM Transactions on Information and System Security (TISSEC)
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Security of RFID Protocols -- A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
New privacy results on synchronized RFID authentication protocols against tag tracing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Lightweight mutual authentication and ownership transfer for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
"Who counterfeited my Viagra?" probabilistic item removal detection via RFID tag cooperation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Role-based access to facilities lifecycle information on RFID tags
Advanced Engineering Informatics
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
Secure authentication scheme for passive C1G2 RFID tags
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
Journal of Network and Computer Applications
Hi-index | 0.00 |
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication abilities of a typical RFID tag. This paper describes a step-by-step construction of a family of simple protocols for inexpensive untraceable identification and authentication of RFID tags. This work is aimed primarily at RFID tags that are capable of performing a small number of inexpensive conventional (as opposed to public key) cryptographic operations. It also represents the first result geared for so-called batch mode of RFID scanning whereby the identification (and/or authentication) of tags is delayed. Proposed protocols involve minimal interaction between a tag and a reader and place very low computational burden on the tag. Notably, they also impose low computational load on back-end servers.