Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
rfidDOT: RFID delegation and ownership transfer made simple
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Cryptanalysis of EC-RAC, a RFID Identification Protocol
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
Efficient zero-knowledge identification schemes which respect privacy
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Algebraic Attacks on RFID Protocols
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Security of RFID Protocols -- A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
RFID privacy: relation between two notions, minimal condition, and efficient construction
Proceedings of the 16th ACM conference on Computer and communications security
PSP: private and secure payment with RFID
Proceedings of the 8th ACM workshop on Privacy in the electronic society
On a new formal proof model for RFID location privacy
Information Processing Letters
Private Interrogation of Devices via Identification Codes
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
RFID survivability quantification and attack modeling
Proceedings of the third ACM conference on Wireless network security
Privacy of recent RFID authentication protocols
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Traceable privacy of recent provably-secure RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Untraceability of RFID protocols
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
RFID security: tradeoffs between security and efficiency
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Vulnerability analysis of RFID protocols for tag ownership transfer
Computer Networks: The International Journal of Computer and Telecommunications Networking
Refresh: weak privacy model for RFID systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Wireless Personal Communications: An International Journal
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
A new framework for RFID privacy
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Secure and private search protocols for RFID systems
Information Systems Frontiers
On RFID privacy with mutual authentication and tag corruption
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Lighten encryption schemes for secure and private RFID systems
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
EC-RAC: enriching a capacious RFID attack collection
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Time measurement threatens privacy-friendly RFID authentication protocols
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Weaknesses in two recent lightweight RFID authentication protocols
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
Journal of Network and Computer Applications
Scalability and Security Conflict for RFID Authentication Protocols
Wireless Personal Communications: An International Journal
Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Security analysis of two recently proposed RFID authentication protocols
Frontiers of Computer Science in China
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes
Wireless Personal Communications: An International Journal
Extending an RFID security and privacy model by considering forward untraceability
STM'10 Proceedings of the 6th international conference on Security and trust management
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
Journal of Network and Computer Applications
Security flaws in a recent RFID delegation protocol
Personal and Ubiquitous Computing
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Practical schemes for privacy and security enhanced RFID
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Modeling privacy for off-line RFID systems
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
A privacy-restoring mechanism for offline RFID systems
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
CHECKER: on-site checking in RFID-based supply chains
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
ROTIV: RFID ownership transfer with issuer verification
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
PSP: Private and secure payment with RFID
Computer Communications
A state-aware RFID privacy model with reader corruption
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
On the security of tan et al. serverless RFID authentication and search protocols
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Improved anonymity for key-trees
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
T-Match: privacy-preserving item matching for storage-only RFID tags
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Cryptanalysis of the RNTS system
The Journal of Supercomputing
CRFID: An RFID system with a cloud database as a back-end server
Future Generation Computer Systems
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme
Wireless Personal Communications: An International Journal
A zero-knowledge based framework for RFID privacy
Journal of Computer Security - ESORICS 2010
Unbalanced states violates RFID privacy
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our contribution is twofold: (1) We propose a simple, formal definition of strong privacy useful for basic analysis of RFID systems, as well as a different (weaker) definition applicable to multi-verifier systems; and (2) We apply our definition to reveal vulnerabilities in proposed privacy-enhancing RFID protocols. This paper is a highly abbreviated version of [15].