The Implications of Pervasive Computing on Network Design
BT Technology Journal
Security Parallels between People and Pervasive Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
Cryptography and authentication on RFID passive tags for apparel products
Computers in Industry
Protocols for RFID tag/reader authentication
Decision Support Systems
International Journal of Internet Protocol Technology
A novel mutual authentication scheme based on quadratic residues for RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Provably Secure Grouping-Proofs for RFID Tags
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Privacy Protection for RFID with Hidden Subset Identifiers
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Cryptography and authentication on RFID passive tags for apparel products
Computers in Industry
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
International Journal of Security and Networks
A family of dunces: trivial RFID identification and authentication protocols
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Efficient techniques for monitoring missing RFID tags
IEEE Transactions on Wireless Communications
n-time protocol for multiple RFID tags authentication
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A survey on RFID security and provably secure grouping-proof protocols
International Journal of Internet Technology and Secured Transactions
Performance comparison of the authentication protocols in RFID system
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Protecting and restraining the third party in RFID-enabled 3PL supply chains
ICISS'10 Proceedings of the 6th international conference on Information systems security
Privacy-preserving ECC-based grouping proofs for RFID
ISC'10 Proceedings of the 13th international conference on Information security
Lightweight RFID authentication with forward and backward security
ACM Transactions on Information and System Security (TISSEC)
Flaws on RFID grouping-proofs. Guidelines for future sound protocols
Journal of Network and Computer Applications
"Who counterfeited my Viagra?" probabilistic item removal detection via RFID tag cooperation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Two RFID-based Solutions to Enhance Inpatient Medication Safety
Journal of Medical Systems
Multi-tag and multi-owner RFID ownership transfer in supply chains
Decision Support Systems
Varying levels of RFID tag ownership in supply chains
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
RFID traceability: a multilayer problem
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
Personal and Ubiquitous Computing
An RFID Based Multi-batch Supply Chain Systems
Wireless Personal Communications: An International Journal
Shoehorning security into the EPC tag standard
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Low Cost RFID Real Lightweight Binding Proof Protocol for Medication Errors and Patient Safety
Journal of Medical Systems
Server-less RFID authentication and searching protocol with enhanced security
International Journal of Communication Systems
Two RFID-Based Solutions for Secure Inpatient Medication Administration
Journal of Medical Systems
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety
Journal of Medical Systems
Using RFID Yoking Proof Protocol to Enhance Inpatient Medication Safety
Journal of Medical Systems
ECC-Based Grouping-Proof RFID for Inpatient Medication Safety
Journal of Medical Systems
Simultaneous multi-level RFID tag ownership & transfer in health care environments
Decision Support Systems
PSP: Private and secure payment with RFID
Computer Communications
Designated attribute-based proofs for RFID applications
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Private yoking proofs: attacks, models and new provable constructions
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
RFID Authentication Protocol to Enhance Patient Medication Safety
Journal of Medical Systems
Hi-index | 0.00 |
RFID (Radio-Frequency Identification) tags aresmall, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility in automating supply-chain logistics, RFID tags promise eventually to supplant theoptical barcode as a means of identifying goods.We propose the concept of a yoking-proof, namely aproof that a pair of RFID tags has been scanned simultaneously. Our particular aim is to permit tags to generatea proof that is verifiable off-line by a trusted entity, evenwhen readers are potentially untrusted. We suggest thatsuch proofs are a useful tool for maintaining integrity insupply chains, particularly as RFID data will commonlyflow across multiple, loosely affiliated organizations.