For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper(1) presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator). Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.This work was supported by the IT R&D program of MSIP/KEIT.[No. 10047212, Development of homomorphic encryption supporting arithmetics on ciphertexts of size less than 1kB and its application...
Providing security in passive RFID systems has gained significant attention due to their widespread ...
Providing security in passive RFID systems has gained significant attention due to their widespread ...
Providing security in passive RFID systems has gained significant attention due to their widespread ...
In this paper we present a novel approach to authentication and privacy in RFID systems based on the...
RFID is a revolutionary remote technology which has many useful implications. Large scale implementa...
RFID is a revolutionary remote technology which has many useful implications. Large scale implementa...
[[abstract]]As low-cost Radio Frequency Identification (RFID) will become pervasive in our daily liv...
Nowadays, the Radio Frequency Identification (RFID) technology is widely used in lots of application...
[[abstract]]©2009 IEEE-EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approve...
Recently, Chen and Deng (2009) proposed an interesting new mutual authentication protocol. Their sch...
AbstractEPC Class-1 Generation-2 specification(Gen2 in brief) has been accepted as the standard for ...
After the world's largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification),...
Recently, Chen and Deng proposed a mutual authentication protocol [7]. Their scheme is based on a cy...
In this paper we investigate the privacy and security threats possible to RFID systems. Here we have...
Concerning the security weakness of EPC scheme especially on privacy concerned applications, an anon...
Providing security in passive RFID systems has gained significant attention due to their widespread ...
Providing security in passive RFID systems has gained significant attention due to their widespread ...
Providing security in passive RFID systems has gained significant attention due to their widespread ...
In this paper we present a novel approach to authentication and privacy in RFID systems based on the...
RFID is a revolutionary remote technology which has many useful implications. Large scale implementa...
RFID is a revolutionary remote technology which has many useful implications. Large scale implementa...
[[abstract]]As low-cost Radio Frequency Identification (RFID) will become pervasive in our daily liv...
Nowadays, the Radio Frequency Identification (RFID) technology is widely used in lots of application...
[[abstract]]©2009 IEEE-EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approve...
Recently, Chen and Deng (2009) proposed an interesting new mutual authentication protocol. Their sch...
AbstractEPC Class-1 Generation-2 specification(Gen2 in brief) has been accepted as the standard for ...
After the world's largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification),...
Recently, Chen and Deng proposed a mutual authentication protocol [7]. Their scheme is based on a cy...
In this paper we investigate the privacy and security threats possible to RFID systems. Here we have...
Concerning the security weakness of EPC scheme especially on privacy concerned applications, an anon...
Providing security in passive RFID systems has gained significant attention due to their widespread ...
Providing security in passive RFID systems has gained significant attention due to their widespread ...
Providing security in passive RFID systems has gained significant attention due to their widespread ...