Broadband Wireless Access
Authentication and Delegation with Smart-cards
TACS '91 Proceedings of the International Conference on Theoretical Aspects of Computer Software
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
NTRU: A Ring-Based Public Key Cryptosystem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Smart cards in hostile environments
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
On the importance of checking cryptographic protocols for faults
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Soft blocking: flexible blocker tags on the cheap
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Privacy management for portable recording devices
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Security Parallels between People and Pervasive Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
The Evolution of RFID Security
IEEE Pervasive Computing
Cryptography and authentication on RFID passive tags for apparel products
Computers in Industry
Collision avoidance in a dense RFID network
WiNTECH '06 Proceedings of the 1st international workshop on Wireless network testbeds, experimental evaluation & characterization
Mining compressed commodity workflows from massive RFID data sets
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
HB-MP: A further step in the HB-family of lightweight authentication protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
RFID data management for effective objects tracking
Proceedings of the 2007 ACM symposium on Applied computing
Tag-Splitting: Adaptive Collision Arbitration Protocols for RFID Tag Identification
IEEE Transactions on Parallel and Distributed Systems
RFID, privacy and the perception of risk: A strategic framework
The Journal of Strategic Information Systems
Chips, tags and scanners: Ethical challenges for radio frequency identification
Ethics and Information Technology
Proceedings of the 5th ACM international workshop on Mobility management and wireless access
Covert channels in privacy-preserving identification systems
Proceedings of the 14th ACM conference on Computer and communications security
The future of radio frequency identification
Journal of Theoretical and Applied Electronic Commerce Research
An anti-counterfeiting RFID privacy protection protocol
Journal of Computer Science and Technology
Radio frequency identification prototyping
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Radio Frequency Identification: a review of low cost tag security proposals
International Journal of Information and Computer Security
RFID tags: privacy and security aspects
International Journal of Mobile Communications
Robust, anonymous RFID authentication with constant key-lookup
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Load balancing in large-scale RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Enterprise Information Systems
Managing RFID Consumer Privacy and Implementation Barriers
Information Systems Security
Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment
Computational Intelligence and Security
Provably Secure Grouping-Proofs for RFID Tags
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Secure authentication and management scheme for RFID
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
International Journal of Applied Cryptography
A tamper-proof and lightweight authentication scheme
Pervasive and Mobile Computing
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
Performance-effective and low-complexity redundant reader detection in wireless RFID networks
EURASIP Journal on Wireless Communications and Networking - Intelligent Systems for Future Generation Wireless Networks
Efficient tag detection in RFID systems
Journal of Parallel and Distributed Computing
eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Universally Composable RFID Identification and Authentication Protocols
ACM Transactions on Information and System Security (TISSEC)
Privacy protection for RFID data
Proceedings of the 2009 ACM symposium on Applied Computing
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Privacy-aware security applications using RFID technology
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
GSN '09 Proceedings of the 3rd International Conference on GeoSensor Networks
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
Computer Standards & Interfaces
Short survey: Taxonomy and survey of RFID anti-collision protocols
Computer Communications
Engineering Applications of Artificial Intelligence
Cryptography and authentication on RFID passive tags for apparel products
Computers in Industry
Towards lightweight secure communication protocols for passive RFIDs
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices
Information Security Applications
Scheme and secure protocol of mobile payment based on RFID
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
An enhanced 2-pass optimistic anonymous RFID authentication protocol with forward security
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An enhanced hierarchical group-index based lightweight authentication protocol with forward security
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An improved lightweight RFID protocol using substring
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A revised one-way hash based low-cost authentication protocol in RFID system
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An improved A-SRAC authentication protocol in RFID system
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Key issues of RFID reader network system
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Research for a dynamic key establishing algorithm suitable for mobile computer
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Security and privacy on low-cost Radio Frequency Identification systems
International Journal of Security and Networks
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
An efficient authentication protocol for RFID systems resistant to active attacks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Anonymous mutual authentication protocol for RFID tag without back-end database
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Efficient RFID authentication protocol for minimizing RFID tag computation
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
The security of EPC Gen2 compliant RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Strong authentication protocol for RFID tag using SHA-1 hash algorithm
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
Java based software framework and its integration in mobile phones using RFID technologies
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Achieving high security and efficiency in RFID-tagged supply chains
International Journal of Applied Cryptography
A one-way hash based low-cost authentication protocol with forward security in RFID system
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 2
An improved forward secure RFID privacy protection scheme
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 2
Lightweight privacy preserving authentication for RFID using a stream cipher
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Lightweight mutual authentication protocol for securing RFID applications
International Journal of Internet Technology and Secured Transactions
Leakage-resilient RFID authentication with forward-privacy
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Efficient RNTS system for privacy of banking off-line customer
The Journal of Supercomputing
Lightweight RFID authentication with forward and backward security
ACM Transactions on Information and System Security (TISSEC)
Secure and scalable RFID authentication protocol
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
An integrated approach for modeling and facilitating RFID-based collaborative logistics processes
Proceedings of the 2011 ACM Symposium on Applied Computing
A mobile patient monitoring system using RFID
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume II
Wearable assistance system for interacting with electronic devices in smart digital home
International Journal of Ad Hoc and Ubiquitous Computing
Is RFID technology secure and private?
Proceedings of the 2011 Information Security Curriculum Development Conference
A novel Threat Evaluation method for privacy-aware system in RFID
International Journal of Ad Hoc and Ubiquitous Computing
Security and privacy analysis of RFID systems using model checking
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Re-identifying anonymous nodes
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
MARP: mobile agent for RFID privacy protection
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Enhanced security and privacy mechanism of RFID service for pervasive mobile device
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
RFID system with fairness within the framework of security and privacy
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Scalable and flexible privacy protection scheme for RFID systems
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A study on secure SDP of RFID using bluetooth communication
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
RFID traceability: a multilayer problem
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A design of privacy conscious RFID system using customizing privacy policy based access control
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Efficient RFID authentication protocol for ubiquitous computing environment
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
WIPI mobile platform with secure service for mobile RFID network environment
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Design and implementation of an index structure using fixed intervals for tracing of RFID tags
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
DiCa: distributed tag access with collision-avoidance among mobile RFID readers
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Authorized tracking and tracing for RFID tags
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
An RFID system based MCLT system with improved privacy
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Resolving the semantic inconsistency problem for ubiquitous RFID applications
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Hash-based RFID security protocol using randomly key-changed identification procedure
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Self re-encryption protocol providing strong privacy for low cost RFID system
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
How to embed short cycles into large nonlinear feedback-shift registers
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Secure EPCglobal class-1 gen-2 RFID system against security and privacy problems
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
A signature-based Grid index design for main-memory RFID database applications
Journal of Systems and Software
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A secure distance-based RFID identification protocol with an off-line back-end database
Personal and Ubiquitous Computing
New security problem in RFID systems “tag killing”
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Low power AES hardware architecture for radio frequency identification
IWSEC'06 Proceedings of the 1st international conference on Security
Practical schemes for privacy and security enhanced RFID
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
An anti-collision algorithm using two-functioned estimation for RFID tags
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
His late master's voice: barking for location privacy
SP'11 Proceedings of the 19th international conference on Security Protocols
Cryptography and Security
EPCBC: a block cipher suitable for electronic product code encryption
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Multifactor authenticated key renewal
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Privacy protection for low-cost RFID tags in IoT systems
Proceedings of the 7th International Conference on Future Internet Technologies
Self-updating: strong privacy protection protocol for RFID-tagged banknotes
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
An information aggregation scheme of multi-node in ubiquitous sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
A study on low-cost RFID system management with mutual authentication scheme in ubiquitous
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
An improved anti-collision algorithm for ISO15693 RFID systems
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Pushing the limits of SHA-3 hardware implementations to fit on RFID
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Security analysis of LMAP using AVISPA
International Journal of Security and Networks
Hi-index | 0.00 |
The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes. We describe RFID technology, summarize our approach and our research, and most importantly, describe the research opportunities in RFID for experts in cryptography and information security. The common theme in low-cost RFID systems is that computation resources are very limited, and all aspects of the RFID system are connected to each other. Understanding these connections and the resulting design trade-offs is an important prerequisite to effectively answering the challenges of security and privacy in low-cost RFID systems.