The wide deployment of RFID systems has raised many concerns about the security and privacy. Many RFID authentication protocols are proposed for these low-cost RFID tags. However, most of existing RFID authentication protocols suffer from some feasible problems. In this paper, we first discuss the feasible problems that exist in some RFID authentication protocols. Then we propose a lightweight RFID mutual authentication protocol against these feasible problems. To the best of our knowledge, it is the first scalable RFID authentication protocol that based on the SQUASH scheme. The new protocol is lightweight and can provide the forward security. In every authentication session, the tag produces the random number and the response is fresh. It...
RFID is a key technology that can be used to create the ubiquitous society. However, this technology...
Part 3: Lightweight AuthenticationInternational audienceIn this paper we propose an efficient forwar...
Out of the large number of RFID security protocols proposed in recent years none have proven to be t...
Part 2: SecurityInternational audienceIn the last decade RFID technology has become widespread. It c...
RFID technology has become popular in many applications; however, most of the RFID products lack sec...
Nowadays, the Radio Frequency Identification (RFID) technology is widely used in lots of application...
RFID is an important technology that can be used to create the ubiquitous society. But an RFID syste...
RFID is an important technology that can be used to create the ubiquitous society. But an RFID syste...
Abstract—With the widespread development of RFID technology, security and privacy issues become more...
The Radio Frequency Identification (RFID) system has been widely used in almost every aspects of the...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been ...
Radio frequency identification (RFID) is an emerg-ing technology for automatic object identification...
Abstract. In this paper we first discuss the security threats that have to be addressed when dealing...
Radio frequency identification (RFID) technology has many applications such as supply chain manageme...
RFID is a key technology that can be used to create the ubiquitous society. However, this technology...
Part 3: Lightweight AuthenticationInternational audienceIn this paper we propose an efficient forwar...
Out of the large number of RFID security protocols proposed in recent years none have proven to be t...
Part 2: SecurityInternational audienceIn the last decade RFID technology has become widespread. It c...
RFID technology has become popular in many applications; however, most of the RFID products lack sec...
Nowadays, the Radio Frequency Identification (RFID) technology is widely used in lots of application...
RFID is an important technology that can be used to create the ubiquitous society. But an RFID syste...
RFID is an important technology that can be used to create the ubiquitous society. But an RFID syste...
Abstract—With the widespread development of RFID technology, security and privacy issues become more...
The Radio Frequency Identification (RFID) system has been widely used in almost every aspects of the...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been ...
Radio frequency identification (RFID) is an emerg-ing technology for automatic object identification...
Abstract. In this paper we first discuss the security threats that have to be addressed when dealing...
Radio frequency identification (RFID) technology has many applications such as supply chain manageme...
RFID is a key technology that can be used to create the ubiquitous society. However, this technology...
Part 3: Lightweight AuthenticationInternational audienceIn this paper we propose an efficient forwar...
Out of the large number of RFID security protocols proposed in recent years none have proven to be t...