New Findings on RFID Authentication Schemes against De-synchronization Attack
In order to protect privacy of RFID tag against malicious tag tracing activities, most RFID authentication protocols support forward/backward security properties by updating the same secret values held at both tag end and database end asynchronously during each authentication session. However, in re...
Saved in:
Main Authors: | YEH, Kuo-Hui, LO, Nai-Wei, LI, Yingjiu, CHEN, Yung-Chun, WU, Tzong-Chen |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2012
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1629 http://www.ijicic.org/ijicic-11-03059.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Adaptive Collision Resolution for Efficient RFID Tag Identification
by: CHEN, Yung-Chun, et al.
Published: (2011) -
A Novel RFID Tag Identification Protocol: Adaptive n-Resolution and k-Collision Arbitration
by: YEH, Kuo-Hui, et al.
Published: (2014) -
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
by: LIANG, Bing, et al.
Published: (2009) -
Efficient Tag Path Authentication Protocol with Less Tag Memory
by: WANG, Hongbing, et al.
Published: (2016) -
A survey on privacy frameworks for RFID authentication
by: SU, Chunhua, et al.
Published: (2012)