A Lightweight Mutual Authentication Protocol for RFID Networks
ICEBE '05 Proceedings of the IEEE International Conference on e-Business Engineering
Protocols for RFID tag/reader authentication
Decision Support Systems
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
CCCM '08 Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management - Volume 02
Identifying RFID-embedded objects in pervasive healthcare applications
Decision Support Systems
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
Proceedings of the second ACM conference on Wireless network security
Engineering Applications of Artificial Intelligence
RFID-enabled item-level retail pricing
Decision Support Systems
LRMAP: lightweight and resynchronous mutual authentication protocol for RFID system
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Framework, strategy and evaluation of health care processes with RFID
Decision Support Systems
Secure and Serverless RFID Authentication and Search Protocols
IEEE Transactions on Wireless Communications
A study on low-cost RFID system management with mutual authentication scheme in ubiquitous
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Engineering Applications of Artificial Intelligence
Multi-tag and multi-owner RFID ownership transfer in supply chains
Decision Support Systems
Varying levels of RFID tag ownership in supply chains
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Simultaneous multi-level RFID tag ownership & transfer in health care environments
Decision Support Systems
Strengthening the Security of EPC C-1 G-2 RFID Standard
Wireless Personal Communications: An International Journal
Two RFID Standard-based Security Protocols for Healthcare Environments
Journal of Medical Systems
Hardware implementation of tag-reader mutual authentication protocol for RFID systems
Integration, the VLSI Journal
Improvement of the Hash-Based RFID Mutual Authentication Protocol
Wireless Personal Communications: An International Journal
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
Decision Support Systems
Hi-index | 0.00 |
As RFID-tagged systems become ubiquitous, the acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past six years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. We consider a stream of publications among these that consider mutual authentication of tag and reader, and identify some existing vulnerabilities.