New Findings on RFID Authentication Schemes against De-synchronization Attack

In order to protect privacy of RFID tag against malicious tag tracing activities, most RFID authentication protocols support forward/backward security properties by updating the same secret values held at both tag end and database end asynchronously during each authentication session. However, in re...

Full description

Saved in:
Bibliographic Details
Main Authors: YEH, Kuo-Hui, LO, Nai-Wei, LI, Yingjiu, CHEN, Yung-Chun, WU, Tzong-Chen
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2012
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1629
http://www.ijicic.org/ijicic-11-03059.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
Be the first to leave a comment!
You must be logged in first