Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols
نویسندگان
چکیده
منابع مشابه
automatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولSecure ubiquitous authentication protocols for RFID systems
In this article, the possible privacy and security threats to the radio frequency identification (RFID) systems are investigated and new authentication protocols are proposed which provide the identified privacy and security in a very efficient manner for a ubiquitous computing environment. The approach utilizes the concepts of two very different, widely known RFID protocols, i.e. the “low-cost...
متن کاملEfficient Cardinality Counting for Large-scale Rfid Systems
Efficient Cardinality Counting for Large-scale RFID Systems
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Personal and Ubiquitous Computing
سال: 2012
ISSN: 1617-4909,1617-4917
DOI: 10.1007/s00779-012-0629-8