Double verification protocol via secret sharing for low-cost RFID tags
RFID tags have become ubiquitous and cheaper to implement. It is often imperative to design ultralightweight authentication protocols for such tags. Many existing protocols still rely on triangular functions, which have been shown to have security and privacy vulnerabilities. This work proposes UMAP...
Saved in:
Main Authors: | Liu, Yali, Ezerman, Martianus Frederic, Wang, Huaxiong |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/100613 http://hdl.handle.net/10220/48553 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
by: PERIS-LOPEZ, Pedro, et al.
Published: (2010) -
Understanding RFID counting protocols
by: Chen, B., et al.
Published: (2014) -
Unmanned library: An intelligent robotic books retrieval & return sytem utilizing RFID tags
by: Yuan, K.H., et al.
Published: (2014) -
Unmanned library: An intelligent robotic books retrieval & return sytem utilizing RFID tags
by: Yuan, K.H., et al.
Published: (2014) -
Interactive learning on RFID via simple project
by: Sun, Yao Zhou
Published: (2024)