Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
In RFIDSec’08, Song proposed an ownership transfer scheme, which consists of an ownership transfer protocol and a secret update protocol [7]. The ownership transfer protocol is completely based on a mutual authentication protocol proposed in WiSec’08 [8]. In Rizomiliotis et al. (2009) [6], van Deurs...
Saved in:
Main Authors: | PERIS-LOPEZ, Pedro, Hernandez-Castro, Julio, Tapiador, Juan, LI, Tieyan, LI, Yingjiu |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2010
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1327 https://ink.library.smu.edu.sg/context/sis_research/article/2326/viewcontent/LiYingjiu_ComprehensiveStudyRFIDMalwaresMobileDevices_2009.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
by: PERIS-LOPEZ, Pedro, et al.
Published: (2008) -
A Security and Performance Evaluation of Hash-Based Rfid Protocols
by: Lim, Tong-Lee, et al.
Published: (2008) -
A survey on privacy frameworks for RFID authentication
by: SU, Chunhua, et al.
Published: (2012) -
Vulnerability analysis of EMAP: An efficient RFID mutual authentication protocol
by: LI, Tieyan, et al.
Published: (2007) -
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
by: LIANG, Bing, et al.
Published: (2009)