Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer

In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec’08 [8]. In Rizomiliotis et al. (2009) [6], van Deurs...

Full description

Saved in:
Bibliographic Details
Main Authors: PERIS-LOPEZ, Pedro, Hernandez-Castro, Julio, Tapiador, Juan, LI, Tieyan, LI, Yingjiu
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2010
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1327
https://ink.library.smu.edu.sg/context/sis_research/article/2326/viewcontent/LiYingjiu_ComprehensiveStudyRFIDMalwaresMobileDevices_2009.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English