Radio-Frequency Identification (RFID) technology has fostered many object monitoring applications. Along with this trend, a corresponding important problem is to verify the intactness of a set of objects using that of their attached tags. Existing solutions necessitate the knowledge of tag identifiers (IDs), sharing the intuition that verifying whether any tag is absent comes after knowing which tags are supposed to be present. Such solutions, however, can hardly live up to the recent vision of anonymous RFID systems that isolate tag IDs from protocols design for privacy concern. In this paper, we take the first leap toward verifying intactness of anonymous RFID systems. We first identify three critical solution requirements-deterministic v...
Cloning attacks threaten radio-frequency identification (RFID) applications but are hard to prevent....
Abstract. We propose a model and definition for anonymous (group) identification that is well suited...
Authentication protocols are usually designed to face an adversary who is able to tamper with the ch...
ogy has fostered many object monitoring systems. Along with this trend, tagged objects ’ value and p...
Radio-Frequency Identification (RFID) technology has fostered many object monitoring systems. Along ...
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we ad...
In this paper, we study systems where a reader wants to authenticate and identify legitimate RFID ta...
A considerable number of anonymous RFID authentication schemes have been proposed. However, current ...
We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of probab...
As the number of RFID applications grows and RFID tags begin to enter many aspects of everyday life,...
In this paper, we provide the following contributions to enhance the security of RFID based systems....
xx, 136 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2013 BuRadio-Frequency Iden...
Radio-Frequency Identification (RFID) technology brings revolutionary changes to many fields like re...
We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of proba...
Abstract. This paper describes an identification and authentication protocol for RFID tags with two ...
Cloning attacks threaten radio-frequency identification (RFID) applications but are hard to prevent....
Abstract. We propose a model and definition for anonymous (group) identification that is well suited...
Authentication protocols are usually designed to face an adversary who is able to tamper with the ch...
ogy has fostered many object monitoring systems. Along with this trend, tagged objects ’ value and p...
Radio-Frequency Identification (RFID) technology has fostered many object monitoring systems. Along ...
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we ad...
In this paper, we study systems where a reader wants to authenticate and identify legitimate RFID ta...
A considerable number of anonymous RFID authentication schemes have been proposed. However, current ...
We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of probab...
As the number of RFID applications grows and RFID tags begin to enter many aspects of everyday life,...
In this paper, we provide the following contributions to enhance the security of RFID based systems....
xx, 136 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2013 BuRadio-Frequency Iden...
Radio-Frequency Identification (RFID) technology brings revolutionary changes to many fields like re...
We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of proba...
Abstract. This paper describes an identification and authentication protocol for RFID tags with two ...
Cloning attacks threaten radio-frequency identification (RFID) applications but are hard to prevent....
Abstract. We propose a model and definition for anonymous (group) identification that is well suited...
Authentication protocols are usually designed to face an adversary who is able to tamper with the ch...