Read / write performance for low memory passive HF RFID tag-reader system
Journal of Theoretical and Applied Electronic Commerce Research
Counting RFID tags efficiently and anonymously
INFOCOM'10 Proceedings of the 29th conference on Information communications
RFID mutual authentication protocols
Decision Support Systems
Security analysis and complexity comparison of some recent lightweight RFID protocols
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Server-less RFID authentication and searching protocol with enhanced security
International Journal of Communication Systems
An improved authentication protocol for mobile agent device in RFID environment
International Journal of Mobile Communications
PUF-enhanced offline RFID security and privacy
Journal of Network and Computer Applications
Survivability Enhancing Techniques for RFID Systems
International Journal of Handheld Computing Research
On the security of tan et al. serverless RFID authentication and search protocols
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Fast tag searching protocol for large-scale RFID systems
IEEE/ACM Transactions on Networking (TON)
On the security of RFID anti-counting security protocol (ACSP)
Journal of Computational and Applied Mathematics
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
Journal of Computational and Applied Mathematics
Journal of Network and Computer Applications
Hi-index | 0.01 |
With the increased popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection for users. Most recent RFID protocols use a central database to store the RFID tag data. The RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. In this paper, we propose a more flexible authentication protocol that provides comparable protection without the need for a central database. We also suggest a protocol for secure search for RFID tags. We believe that as RFID applications become widespread, the ability to securely search for RFID tags will be increasingly useful.