Protocols for RFID tag/reader authentication
Decision Support Systems
Provably Secure Grouping-Proofs for RFID Tags
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
International Journal of Security and Networks
Efficient techniques for monitoring missing RFID tags
IEEE Transactions on Wireless Communications
n-time protocol for multiple RFID tags authentication
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A survey on RFID security and provably secure grouping-proof protocols
International Journal of Internet Technology and Secured Transactions
Performance comparison of the authentication protocols in RFID system
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Protecting and restraining the third party in RFID-enabled 3PL supply chains
ICISS'10 Proceedings of the 6th international conference on Information systems security
Flaws on RFID grouping-proofs. Guidelines for future sound protocols
Journal of Network and Computer Applications
Two RFID-based Solutions to Enhance Inpatient Medication Safety
Journal of Medical Systems
Multi-tag and multi-owner RFID ownership transfer in supply chains
Decision Support Systems
Hash-based RFID security protocol using randomly key-changed identification procedure
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
Personal and Ubiquitous Computing
An RFID Based Multi-batch Supply Chain Systems
Wireless Personal Communications: An International Journal
Low Cost RFID Real Lightweight Binding Proof Protocol for Medication Errors and Patient Safety
Journal of Medical Systems
Two RFID-Based Solutions for Secure Inpatient Medication Administration
Journal of Medical Systems
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety
Journal of Medical Systems
Using RFID Yoking Proof Protocol to Enhance Inpatient Medication Safety
Journal of Medical Systems
ECC-Based Grouping-Proof RFID for Inpatient Medication Safety
Journal of Medical Systems
Private yoking proofs: attacks, models and new provable constructions
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Hi-index | 0.00 |
An RFID tag is a small and cheap device which is combined in IC chip and an antennafor radio communications. The tag is used for management of goods and its distribution. Moreover it reduces the cost of managements of goods. Howevel; an RFID system has some security problems. Juels proposed a "yoking-proof" which guarantees the existence of two tags [2] But we point out that this scheme is not secure against a replay attack. In this paper; we propose a scheme which deals with the problem by using time stamp. Moreovel; we propose a scheme which guarantees the existence of a group of RFID tags.