An Efficient and Secure RFID Security Method with Ownership Transfer
Computational Intelligence and Security
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
Proceedings of the second ACM conference on Wireless network security
Secure ownership and ownership transfer in RFID systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Lightweight mutual authentication and ownership transfer for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
An agent based back-end RFID tag management system
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Practical RFID ownership transfer scheme
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
ROTIV: RFID ownership transfer with issuer verification
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Hi-index | 0.00 |
A Radio-Frequency-Identification (RFID) tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. The RFID tag is used for management of goods and used as a substitute for a bar code. However, RFID system may infringe on a consumer’s privacy because it has a strong tracing ability. In this paper, we propose a key change scheme which can prevent previous owner from reading the RFID tag after changing its owner. By using our scheme, previous owner cannot read and trace ID information on the RFID tag. Moreover it is possible to combine other privacy protection scheme with our scheme because our scheme uses only symmetric key cryptography.