Cardinality estimation and tag authentication are two major issues in large-scale Radio Frequency Identification (RFID) systems. While there exist both per-tag and probabilistic approaches for the cardinality estimation, the RFID-oriented authentication protocols are mainly per-tag based: the reader authenticates one tag at each time. For a batch of tags, current RFID systems have to identify them and then authenticate each tag sequentially, incurring large volume of authentication data and huge communication cost. We study the RFID batch authentication issue and propose the first probabilistic approach, termed as Single Echo based Batch Authentication (SEBA), to meet the requirement of prompt and reliable batch authentications in large sca...
Counterfeiting is one of the most serious problems in the consumer market. One promising ap-proach f...
The biggest challenge for current RFID technology is to provide the necessary benefits while avoidin...
Abstract—The widely used RFID tags impose serious pri-vacy concerns as a tag responds to queries fro...
Abstract—Cardinality estimation and tag authentication are two major issues in large-scale Radio Fre...
Radio Frequency Identification technology (RFID) is widely used in many applications, such as asset ...
Many algorithms have been introduced to deterministically authenticate Radio Frequency Identificatio...
RFID is a promising technology for anti-counterfeiting since it facilitates processing of product in...
RFID technology facilitates processing of product information, making it a promising technology for ...
Many algorithms have been introduced to deterministically authenticate Radio Frequency Identificatio...
Abstract Passive Radio Frequency Identification (RFID) tags are nowadays used in stores and industri...
The prevalence of Radio Frequency Identification (RFID) technology requires Privacy-Preserving Authe...
MasterCounterfeiting is one of the most serious problems in the consumer market.One promising approa...
The widely used RFID tags impose serious privacy concerns as a tag responds to queries from readers ...
In this paper, we provide the following contributions to enhance the security of RFID based systems....
The prevalence of Radio Frequency Identification (RFID) technology requires Privacy-Preserving Authe...
Counterfeiting is one of the most serious problems in the consumer market. One promising ap-proach f...
The biggest challenge for current RFID technology is to provide the necessary benefits while avoidin...
Abstract—The widely used RFID tags impose serious pri-vacy concerns as a tag responds to queries fro...
Abstract—Cardinality estimation and tag authentication are two major issues in large-scale Radio Fre...
Radio Frequency Identification technology (RFID) is widely used in many applications, such as asset ...
Many algorithms have been introduced to deterministically authenticate Radio Frequency Identificatio...
RFID is a promising technology for anti-counterfeiting since it facilitates processing of product in...
RFID technology facilitates processing of product information, making it a promising technology for ...
Many algorithms have been introduced to deterministically authenticate Radio Frequency Identificatio...
Abstract Passive Radio Frequency Identification (RFID) tags are nowadays used in stores and industri...
The prevalence of Radio Frequency Identification (RFID) technology requires Privacy-Preserving Authe...
MasterCounterfeiting is one of the most serious problems in the consumer market.One promising approa...
The widely used RFID tags impose serious privacy concerns as a tag responds to queries from readers ...
In this paper, we provide the following contributions to enhance the security of RFID based systems....
The prevalence of Radio Frequency Identification (RFID) technology requires Privacy-Preserving Authe...
Counterfeiting is one of the most serious problems in the consumer market. One promising ap-proach f...
The biggest challenge for current RFID technology is to provide the necessary benefits while avoidin...
Abstract—The widely used RFID tags impose serious pri-vacy concerns as a tag responds to queries fro...