HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks
SECPERU '06 Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Public-Key Cryptography for RFID-Tags
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Security problems of RFID authentication protocols
ICOSSSE'07 Proceedings of the 6th WSEAS international conference on System science and simulation in engineering
Hi-index | 0.00 |
RFID is a technology concept that allows collecting data automatically at high speeds, which is appealing to many industries, but the introduction of this technology brings many technological and information processing specific obstacles with it. This paper describes a method that offers a systematic approach for evaluating communication protocols which are sensitive in means of information security in different environments.