An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
On sharing secrets and Reed-Solomon codes
Communications of the ACM
Communications of the ACM
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Novel Anti-collision Algorithms for Fast Object Identification in RFID System
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Privacy threats and issues in mobile RFID
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Proceedings of the 2007 ACM symposium on Applied computing
Dynamic Balanced Key Tree Management for Secure Multicast Communications
IEEE Transactions on Computers
Grain: a stream cipher for constrained environments
International Journal of Wireless and Mobile Computing
Computation-Efficient Multicast Key Distribution
IEEE Transactions on Parallel and Distributed Systems
How to Monitor for Missing RFID tags
ICDCS '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
Two Security Problems of RFID Security Method with Ownership Transfer
NPC '08 Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
Enhancement of the RFID security method with ownership transfer
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Defining strong privacy for RFID
ACM Transactions on Information and System Security (TISSEC)
Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
A New RFID Authentication Protocol with Ownership Transfer in an Insecure Communication Environment
HIS '09 Proceedings of the 2009 Ninth International Conference on Hybrid Intelligent Systems - Volume 01
Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags
HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
Secure ownership and ownership transfer in RFID systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Vulnerabilities in some recently proposed RFID ownership transfer protocols
IEEE Communications Letters
Time measurement threatens privacy-friendly RFID authentication protocols
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Across-authority lightweight ownership transfer protocol
Electronic Commerce Research and Applications
A case against currently used hash functions in RFID protocols
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
An anti-collision algorithm using two-functioned estimation for RFID tags
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Protocol for ownership transfer across authorities: with the ability to assign transfer target
Security and Communication Networks
Two RFID Standard-based Security Protocols for Healthcare Environments
Journal of Medical Systems
Hi-index | 0.00 |
With the combination of mobile devices and readers in recent years, mobile Radio Frequency Identification (RFID) systems have been widely deployed in mobile identification. E-commerce, for instance, has applied many of mobile RFID's deriving services, one of which is the transfer of a tagged item's ownership in supply chains. However, current tag ownership transfer protocols can only transfer one tag at a time. For example, Yang et al.'s Secure Ownership Transfer Protocol is designed for low-cost lightweight RFID tags but it can only do one tag a time. For this reason, we propose a secure RFID protocol for group ownership transfer. We can transfer group(s) of tags' ownership in one attempt. Since the two supplicants involved in ownership transfer are usually under different servers' authorities, our protocol is designed to allow authority-crossing ownership transfer in a mobile RFID environment. Besides, it is able to assign its transfer targets and to secure against most RFID attacks.