A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Security Parallels between People and Pervasive Devices
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Extending the EPC network: the potential of RFID in anti-counterfeiting
Proceedings of the 2005 ACM symposium on Applied computing
Untraceable RFID tags via insubvertible encryption
Proceedings of the 12th ACM conference on Computer and communications security
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Universally composable and forward-secure RFID authentication and authenticated key exchange
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Protocols for RFID tag/reader authentication
Decision Support Systems
IEEE Transactions on Dependable and Secure Computing
RFID authentication protocol for low-cost tags
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Robust, anonymous RFID authentication with constant key-lookup
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A novel mutual authentication scheme based on quadratic residues for RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Low-Cost Authentication Protocol of the RFID System Using Partial ID
Computational Intelligence and Security
An Efficient and Secure RFID Security Method with Ownership Transfer
Computational Intelligence and Security
Security and Privacy on Authentication Protocol for Low-Cost RFID
Computational Intelligence and Security
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
International Journal of Applied Cryptography
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
New mutual agreement protocol to secure mobile RFID-enabled devices
Information Security Tech. Report
Scalable privacy protecting scheme through distributed RFID tag identification
Proceedings of the workshop on Applications of private and anonymous communications
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A New Formal Proof Model for RFID Location Privacy
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A study on secure RFID mutual authentication scheme in pervasive computing environment
Computer Communications
eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
An Efficient Authentication Protocol for Low-Cost RFID Systems
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Efficient RFID authentication protocols based on pseudorandom sequence generators
Designs, Codes and Cryptography
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
Proceedings of the second ACM conference on Wireless network security
Secure RFID authentication scheme for EPC class Gen2
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A hybrid approach for privacy-preserving RFID tags
Computer Standards & Interfaces
Cellular automata-based authentication for low-cost RFID systems
International Journal of Communication Networks and Distributed Systems
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
A Highly Scalable RFID Authentication Protocol
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
Computer Standards & Interfaces
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Journal of Parallel and Distributed Computing
Security of RFID Protocols -- A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
IEEE Communications Letters
An efficient forward private RFID protocol
Proceedings of the 16th ACM conference on Computer and communications security
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
Anonymizer-Enabled Security and Privacy for RFID
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
An UHF RFID transponder with novel demodulator and security algorithm
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A secure and efficient authentication protocol for passive RFID tags
ISWCS'09 Proceedings of the 6th international conference on Symposium on Wireless Communication Systems
Research on the authentication mechanism for 3G mobile communication system
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
A Lightweight Authentication Protocol for Low-Cost RFID
Journal of Signal Processing Systems
LRMAP: lightweight and resynchronous mutual authentication protocol for RFID system
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Novel RFID authentication schemes for security enhancement and system efficiency
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP)
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Privacy protection scheme of RFID using random number
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
A lightweight RFID protocol using substring
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
An efficient mutual authentication protocol on RFID tags
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Low-cost and strong-security RFID authentication protocol
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Anonymous mutual authentication protocol for RFID tag without back-end database
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Efficient RFID authentication protocol for minimizing RFID tag computation
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
The security of EPC Gen2 compliant RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Mutual authentication protocol for RFID tags based on synchronized secret information with monitor
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
New privacy results on synchronized RFID authentication protocols against tag tracing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Active networks privacy protection and vulnerabilities
ACMOS'10 Proceedings of the 12th WSEAS international conference on Automatic control, modelling & simulation
Anti-collision protocol for RFID-sensor network and the security threats
ACMOS'10 Proceedings of the 12th WSEAS international conference on Automatic control, modelling & simulation
Dissolving active networks privacy threats and vulnerabilities
WSEAS TRANSACTIONS on COMMUNICATIONS
A secure RFID ticket system for public transport
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Lightweight privacy preserving authentication for RFID using a stream cipher
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
A desynchronization tolerant RFID private authentication protocol
WASA'10 Proceedings of the 5th international conference on Wireless algorithms, systems, and applications
A lightweight anti-desynchronization RFID authentication protocol
Information Systems Frontiers
Revisiting unpredictability-based RFID privacy models
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Leakage-resilient RFID authentication with forward-privacy
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Scalable RFID security protocols supporting tag ownership transfer
Computer Communications
Efficient RNTS system for privacy of banking off-line customer
The Journal of Supercomputing
Lightweight RFID authentication with forward and backward security
ACM Transactions on Information and System Security (TISSEC)
Diffusing RFID-sensor networks and security threats
WSEAS Transactions on Signal Processing
Scalability and Security Conflict for RFID Authentication Protocols
Wireless Personal Communications: An International Journal
Security analysis and complexity comparison of some recent lightweight RFID protocols
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Passive cryptanalysis of the unconditionally secure authentication protocol for RFID systems
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
RFID systems: a survey on security threats and proposed solutions
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Strong and robust RFID authentication enabling perfect ownership transfer
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Efficient authentication for low-cost RFID systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Scalable and flexible privacy protection scheme for RFID systems
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Safe authentication method for security communication in ubiquitous
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
RFID traceability: a multilayer problem
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
ACSP: A novel security protocol against counting attack for UHF RFID systems
Computers & Mathematics with Applications
Efficient RFID authentication protocol for ubiquitous computing environment
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A scalable and untraceable authentication protocol for RFID
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Vulnerability of an RFID authentication protocol proposed in at secubiq 2005
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Authorized tracking and tracing for RFID tags
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
Journal of Network and Computer Applications
M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Hash-based RFID security protocol using randomly key-changed identification procedure
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Secure EPCglobal class-1 gen-2 RFID system against security and privacy problems
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
A case against currently used hash functions in RFID protocols
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Security flaws in a recent RFID delegation protocol
Personal and Ubiquitous Computing
New security problem in RFID systems “tag killing”
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
His late master's voice: barking for location privacy
SP'11 Proceedings of the 19th international conference on Security Protocols
Cryptography and Security
EPCBC: a block cipher suitable for electronic product code encryption
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
RFID system for public train transportation
Security and Communication Networks
Server-less RFID authentication and searching protocol with enhanced security
International Journal of Communication Systems
A minimum disclosure approach to authentication and privacy in RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Self-updating: strong privacy protection protocol for RFID-tagged banknotes
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
On device authentication in wireless networks: present issues and future challenges
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
A study on low-cost RFID system management with mutual authentication scheme in ubiquitous
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
An improved anti-collision algorithm for ISO15693 RFID systems
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Survivability Enhancing Techniques for RFID Systems
International Journal of Handheld Computing Research
Critical Evaluation of RFID Security Protocols
International Journal of Information Security and Privacy
RFID Authentication Protocol to Enhance Patient Medication Safety
Journal of Medical Systems
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
Journal of Network and Computer Applications
Unbalanced states violates RFID privacy
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
Radio-Frequency Identification Devices (RFID) mayemerge as one of the most pervasive computingtechnologies in history. On the one hand, with tagsaffixed to consumer items as well as letters, packets orvehicles costs in the supply chain can be greatlyreduced and new applications introduced. On the otherhand, unique means of identification in each tag likeserial numbers enable effortless traceability of personsand goods. But data protection and privacy areworthwhile civil liberties.This paper introduces a simple scheme relying on one-wayhash-functions that greatly enhances locationprivacy by changing traceable identifiers on every readgetting by with only a single, unreliable messageexchange. Thereby the scheme is safe from manythreats like eavesdropping, message interception,spoofing, and replay attacks.