EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A Computing Procedure for Quantification Theory
Journal of the ACM (JACM)
Noise-tolerant learning, the parity problem, and the statistical query model
Journal of the ACM (JACM)
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Disabling RFID tags with visible confirmation: clipped tags are silenced
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
The Evolution of RFID Security
IEEE Pervasive Computing
Is Your Cat Infected with a Computer Virus?
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
An RFID Distance Bounding Protocol
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks
SECPERU '06 Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
Mobile decision support for in-store purchase decisions
Decision Support Systems
Supply chain information sharing in a macro prediction market
Decision Support Systems
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Noisy tags: a pretty good key exchange protocol for RFID tags
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
On the inherent intractability of certain coding problems (Corresp.)
IEEE Transactions on Information Theory
Reducing false reads in RFID-embedded supply chains
Journal of Theoretical and Applied Electronic Commerce Research
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Computer Standards & Interfaces
Identifying RFID-embedded objects in pervasive healthcare applications
Decision Support Systems
Enhancement of the RFID security method with ownership transfer
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
The Swiss-Knife RFID Distance Bounding Protocol
Information Security and Cryptology --- ICISC 2008
Bit-oriented generators for Wireless Sensor Networks and low cost RFID transponders
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels
IEEE Communications Letters
RFID survivability quantification and attack modeling
Proceedings of the third ACM conference on Wireless network security
An efficient authentication protocol for RFID systems resistant to active attacks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Knowledge-based RFID enabled Web Service architecture for supply chain management
Expert Systems with Applications: An International Journal
Framework, strategy and evaluation of health care processes with RFID
Decision Support Systems
RFID mutual authentication protocols
Decision Support Systems
Supporting real-time supply chain decisions based on RFID data streams
Journal of Systems and Software
Engineering Applications of Artificial Intelligence
Multi-tag and multi-owner RFID ownership transfer in supply chains
Decision Support Systems
A real-time food safety management system for receiving operations in distribution centers
Expert Systems with Applications: An International Journal
A review of RFID technology and its managerial applications in different industries
Journal of Engineering and Technology Management
Patient Safety Through RFID: Vulnerabilities in Recently Proposed Grouping Protocols
Journal of Medical Systems
Vulnerabilities of RFID protocols proposed in ISF
Information Systems Frontiers
A minimum disclosure approach to authentication and privacy in RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Simultaneous multi-level RFID tag ownership & transfer in health care environments
Decision Support Systems
A real-time risk control and monitoring system for incident handling in wine storage
Expert Systems with Applications: An International Journal
Hardware Cost Measurement of Lightweight Security Protocols
Wireless Personal Communications: An International Journal
Strengthening the Security of EPC C-1 G-2 RFID Standard
Wireless Personal Communications: An International Journal
Hardware implementation of tag-reader mutual authentication protocol for RFID systems
Integration, the VLSI Journal
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
Decision Support Systems
Hi-index | 0.00 |
Radio-Frequency Identification (RFID) tags are poised to supplant barcodes in the very near future. Their information storage capacity as well as their ability to transfer information through contactless means without line-of-sight translates to significant advantage over barcodes. However, cost and privacy issues are major impediments to their widespread use. We consider the latter issue, specifically those that relate to securely authenticating RFID tags and readers. Light-weight authentication protocols are necessary in RFID applications due to tag-level constraints. Over the past few years, several streams of research have emerged approaching the RFID tag/reader privacy/security problem from different perspectives. We study and evaluate a few protocols from each of those streams, identify possible vulnerabilities, and provide alternate solutions when possible. We provide security analysis of the proposed solutions.