Anti-counterfeit ownership transfer protocol for low cost RFID system
WSEAS Transactions on Computers
rfidDOT: RFID delegation and ownership transfer made simple
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Enhanced RFID Security Method with Ownership Transfer
CIS '08 Proceedings of the 2008 International Conference on Computational Intelligence and Security - Volume 02
A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment
HIS '09 Proceedings of the 2009 Ninth International Conference on Hybrid Intelligent Systems - Volume 01
Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Multi-tag and multi-owner RFID ownership transfer in supply chains
Decision Support Systems
Secure multiple group ownership transfer protocol for mobile RFID
Electronic Commerce Research and Applications
An Ownership Transfer Scheme Using Mobile RFIDs
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Authentication of RFID tags is commonly achieved through cryptographic means with protocols that encrypt communication between the parties of interest. There is an extensive literature in this area that address various facets associated with authentication. As RFID tags gain more popularity, there is a concomitant increase in frequency with which they (i.e., the tagged object) change ownership. There is, therefore, an urgent need to develop and evaluate protocols that address issues related to ownership transfer of RFID tags. Over the past few years, researchers have proposed several ownership transfer protocols. We consider some of the ownership transfer protocols that were published during the past year and identify present vulnerabilities.