EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Special Uses and Sbuses of the Fiat-Shamir Passport Protocol
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Identification Tokens - or: Solving the Chess Grandmaster Problem
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Establishing Big Broth Using Covert Channals and Other Covert Techniques
Proceedings of the First International Workshop on Information Hiding
An Open Mobile Identity Tool: An Architecture for Mobile Identity Management
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Realization of RF distance bounding
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
A framework for analyzing RFID distance bounding protocols
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Hi-index | 0.00 |
RFID is now in fashion. Exactly 20 years ago it was pointed out that identification based on electronic tokens suffer from the middleman attack. So, obviously RFIDs do too. Worse, the middleman attack is even easier to set up. Privacy advocates have expressed concerns about the use of RFIDs. Two implementations are compared: the use of RFID cards in the underground in Shanghai (similarly for Singapore) and the use in the London system. We conclude that privacy concerns can sometimes be addressed succesfully. We also address reliabilty concerns since RFID cards are easy to break. Finally we address the psychological issue that RFIDs are believed to be secure.