Proceedings of the 2007 ACM symposium on Applied computing
An Efficient and Secure RFID Security Method with Ownership Transfer
Computational Intelligence and Security
rfidDOT: RFID delegation and ownership transfer made simple
Proceedings of the 4th international conference on Security and privacy in communication netowrks
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
New privacy results on synchronized RFID authentication protocols against tag tracing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Secure ownership and ownership transfer in RFID systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Reassignment scheme of an RFID tag’s key for owner transfer
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Secure architecure for the integration of RFID and sensors in personal networks
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
When an RFID tag changes hand, it is not as simply as handing over the tag secret to the new owner. Privacy is a concern if there is no secure ownership transfer scheme to aid the transfer. After sales service and temporary tag delegation are also features commonly seen in such applications. In this paper, we proposed a new RFID ownership transfer scheme that achieves the most security protections and properties in comparison to most of the previous schemes. We also introduced four new security properties that have not been considered before. This opens up new research directions for further development of RFID ownership transfer.