Scalable RFID security protocols supporting tag ownership transfer

作者: Boyeon Song , Chris J. Mitchell

DOI: 10.1016/J.COMCOM.2010.02.027

关键词: AuthorizationComputer securityCryptographic protocolAuthenticationProtocol (science)ScalabilityIdentification (information)Scheme (programming language)Radio-frequency identificationComputer science

摘要: … for radio frequency identification (RFID) protocols, as well as … In support of scalability, some RFID protocols, however, only … We propose a novel scalable RFID authentication protocol …

参考文章(33)
A. Acquisti, Stefanos Gritzalis, C. Lambrinoudakis, Pablo Najera, Javier Lopez, Sabrina De Capitani di Vimercati, RFID: Technological Issues and Privacy Concerns Digital Privacy: Theory, Technologies, and Practices. ,(2007)
Sasa Radomirovic, Ton van Deursen, Attacks on RFID Protocols IACR Cryptology ePrint Archive. ,vol. 2008, pp. 310- ,(2008)
Dang Nguyen Duc, Kwangjo Kim, Hyunrok Lee, Enhancing Security of EPCGlobal Gen-2 RFID against Traceability and Cloning ,(2006)
Taekyoung Kwon, Chae Hoon Lim, Strong and robust RFID authentication enabling perfect ownership transfer Lecture Notes in Computer Science. pp. 1- 20 ,(2006)
Shingo Kinoshita, Miyako Ohkubo, Koutarou Suzuki, Cryptographic Approach to “Privacy-Friendly” Tags ,(2003)
David Molnar, Andrea Soppera, David Wagner, A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags international conference on selected areas in cryptography. pp. 276- 290 ,(2005) , 10.1007/11693383_19
Khaled Ouafi, Raphael C. -W. Phan, Traceable privacy of recent provably-secure RFID protocols applied cryptography and network security. pp. 479- 489 ,(2008) , 10.1007/978-3-540-68914-0_29