Radio frequency identification (RFID) is a ubiquitous wireless technology that allows objects to be identified automatically. Using the RFID technology can simplify many applications and provide many benefits but meanwhile, the security and privacy of RFID systems should be taken into account. In this thesis, we have two goals. The first one is to improve the security and privacy in RFID systems. Our second goal is to provide accurate analytical models for the most important tag singulation schemes. We use these analytical models to evaluate and compare the efficiency of the tag singulation schemes. First, we study the blocking attack in RFID systems and develop an analytical model for it. Using this analytical model, we propose two probabi...
In this paper we investigate the privacy and security threats possible to RFID systems. Here we have...
This paper proposes an improved two-way security authentication protocol to improve the security lev...
In this paper, we study systems where a reader wants to authenticate and identify legitimate RFID ta...
Radio frequency identification (RFID) is a ubiquitous wireless technology that allows objects to be ...
In this paper, we provide the following contributions to enhance the security of RFID based systems....
In this paper, we provide the following contributions to enhance the security of RFID based systems....
In this paper, we provide the following contributions to enhance the security of RFID based systems....
This thesis aims to create a secure and practical RFID security framework, particularly on providing...
Abstract. This paper describes an identification and authentication protocol for RFID tags with two ...
Protecting RFID security and privacy is very important to the future development of RFID technology....
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we ad...
[[abstract]]"Radio Frequency Identification (RFID) with Tags that contain electronic product codes ...
Radio-Frequency IDentification (RFID) is the current trend allowing the identification and/or authen...
IEEE International Conference on Cybernetics and Intelligent Systems (CIS 2007)Generally, RFID sys...
Radio Frequency Identification (RFID) is a very versatile technology. It has the potential to increa...
In this paper we investigate the privacy and security threats possible to RFID systems. Here we have...
This paper proposes an improved two-way security authentication protocol to improve the security lev...
In this paper, we study systems where a reader wants to authenticate and identify legitimate RFID ta...
Radio frequency identification (RFID) is a ubiquitous wireless technology that allows objects to be ...
In this paper, we provide the following contributions to enhance the security of RFID based systems....
In this paper, we provide the following contributions to enhance the security of RFID based systems....
In this paper, we provide the following contributions to enhance the security of RFID based systems....
This thesis aims to create a secure and practical RFID security framework, particularly on providing...
Abstract. This paper describes an identification and authentication protocol for RFID tags with two ...
Protecting RFID security and privacy is very important to the future development of RFID technology....
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we ad...
[[abstract]]"Radio Frequency Identification (RFID) with Tags that contain electronic product codes ...
Radio-Frequency IDentification (RFID) is the current trend allowing the identification and/or authen...
IEEE International Conference on Cybernetics and Intelligent Systems (CIS 2007)Generally, RFID sys...
Radio Frequency Identification (RFID) is a very versatile technology. It has the potential to increa...
In this paper we investigate the privacy and security threats possible to RFID systems. Here we have...
This paper proposes an improved two-way security authentication protocol to improve the security lev...
In this paper, we study systems where a reader wants to authenticate and identify legitimate RFID ta...