Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
IEEE Transactions on Dependable and Secure Computing
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
Computer Standards & Interfaces
A hybrid approach for privacy-preserving RFID tags
Computer Standards & Interfaces
PAP: A privacy and authentication protocol for passive RFID tags
Computer Communications
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
IEEE Communications Letters
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
The primary defect of current authentication schemes for Radio Frequency Identification (RFID) tags lies in that in order to identify only one single tag they require a linear computational complexity on the server side. We propose a secure RFID mutual authentication scheme in this paper. It not only provides confidentiality, untraceability and mutual authentication, but also have efficiency in terms of time complexity, space complexity and communication cost which are very important for practical large scale RFID applications.