An efficient and secure RFID security method with ownership transfer
K Osaka, T Takagi, K Yamazaki… - 2006 International …, 2006 - ieeexplore.ieee.org
Radio frequency identification (RFID) has come under the spotlight as technology
supporting ubiquitous society. But now, we face several security problems and challenges in …
supporting ubiquitous society. But now, we face several security problems and challenges in …
RFID protocol enabling ownership transfer to protect against traceability and DoS attacks
H Lei, T Cao - The First International Symposium on Data …, 2007 - ieeexplore.ieee.org
In this paper, we point out weaknesses of Kyosuke Osada et al's protocol. We find that their
scheme cannot resist DoS attack and traceability, and does not provide forward security …
scheme cannot resist DoS attack and traceability, and does not provide forward security …
Enhancement of the RFID security method with ownership transfer
HB Chen, WB Lee, YH Zhao, YL Chen - Proceedings of the 3rd …, 2009 - dl.acm.org
Radio frequency identification (RFID) is one popular technology being deployed for a variety
of applications. Privacy and security issues play major roles in the success of RFID …
of applications. Privacy and security issues play major roles in the success of RFID …
Two security problems of RFID security method with ownership transfer
Radio frequency identification (RFID) is a technology that allows automatic identification and
data capture by using radio frequencies. In 2006, Osaka et al. proposed a RFID security …
data capture by using radio frequencies. In 2006, Osaka et al. proposed a RFID security …
Security and privacy concerns about the RFID layer of EPC Gen2 networks
J Garcia-Alfaro, J Herrera-Joancomartí… - Advanced research in …, 2015 - Springer
RFID systems are composed by tags (also known as electronic labels) storing an
identification sequence which can be wirelessly retrieved by an interrogator, and transmitted …
identification sequence which can be wirelessly retrieved by an interrogator, and transmitted …
[PDF][PDF] Classification of RFID Threats based on Security Principles
A Mitrokotsa, M Beye, P Peris-Lopez - Security Lab, Faculty of Electrical …, 2011 - Citeseer
RFID technology is an area currently undergoing active development. An issue, which has
received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of …
received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of …
Scalable and resynchronisable radio frequency identification ownership transfer protocol based on a sliding window mechanism
X Wang, CW Yuan - IET Information Security, 2014 - Wiley Online Library
A lightweight scalable and resynchronisable protocol is presented for radio frequency
identification (RFID) ownership transfer. The proposed protocol employs a sliding window …
identification (RFID) ownership transfer. The proposed protocol employs a sliding window …
An improved RFID security method with ownership transfer
YQ Gui, J Zhang, HK Choi - ICTC 2011, 2011 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) security gets more and more important as the RFID
technology has been gaining popularity from public. In this paper, we proposed a simple …
technology has been gaining popularity from public. In this paper, we proposed a simple …
Threats to networked RFID systems
A Mitrokotsa, M Beye, P Peris-Lopez - Unique Radio Innovation for the …, 2011 - Springer
RFID technology is an area currently undergoing active development. An issue, which has
received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of …
received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of …
基于滑动窗口机制的RFID 自同步可扩展所有权变更协议
王昕, 袁超伟, 黄晨 - 北京邮电大学学报, 2013 - journal.bupt.edu.cn
针对可扩展射频标签(RFID) 认证鉴权子协议P 1 存储代价与寻签查找效率的矛盾和密钥更新子
协议P 2 的非同步攻击缺陷, 提出了一种改进的RFID 轻量级, 可扩展, 自同步所有权变更协议 …
协议P 2 的非同步攻击缺陷, 提出了一种改进的RFID 轻量级, 可扩展, 自同步所有权变更协议 …