Abstract—Operational and security requirements for RFID systems such as system scalability, anonymity and anti-cloning are difficult to obtain due to constraints in area, memory, etc. Due to scarceness of resources most of the proposed protocols were designed using symmetric key cryptographic algorithms. However, it has been shown that it is inevitable to use public-key cryptographic algorithms to satisfy these requirements [1]. Moreover, general public-key cryptography based authentication protocols are vulnerable in terms of anonymity, which is shown in this paper. Accordingly, we design a new authentication protocol named EC-RAC using EC (Elliptic Curve) cryptography. EC-RAC can be proved for its security in the generic group model and i...
We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of...
We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of...
Advances in communication and information technologies have led to the emergence of Internet of Thin...
Abstract. The emergence of pervasive computing devices such as RFID tags raises numerous privacy iss...
The availability of safety has always been a challenge in all fields of computing and networking, an...
The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Crypt...
Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly c...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applicati...
With the widely development and deployment of Radio Frequency Identification (RFID) technology for n...
The implementation of RFID technology has globally impacted several industries and this revolution h...
[[abstract]]Radio frequency identification tag authentication protocols are generally classified as ...
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generat...
Radio frequency identification (RFID) authentication is an indispensable part of RFID applications, ...
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we ad...
We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of...
We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of...
Advances in communication and information technologies have led to the emergence of Internet of Thin...
Abstract. The emergence of pervasive computing devices such as RFID tags raises numerous privacy iss...
The availability of safety has always been a challenge in all fields of computing and networking, an...
The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Crypt...
Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly c...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applicati...
With the widely development and deployment of Radio Frequency Identification (RFID) technology for n...
The implementation of RFID technology has globally impacted several industries and this revolution h...
[[abstract]]Radio frequency identification tag authentication protocols are generally classified as ...
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generat...
Radio frequency identification (RFID) authentication is an indispensable part of RFID applications, ...
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we ad...
We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of...
We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of...
Advances in communication and information technologies have led to the emergence of Internet of Thin...