Privacy is one of the most important security concerns in radio frequency identification. The publication of hundred RFID-based authentication protocols during the last decade raised the need of designing a dedicated privacy model. An important step has been done with the model of Vaudenay that combines early models into a unified and powerful one. In particular, this model addresses the case where an adversary is able to know whether or not the protocol execution succeeded. This modelizes the fact that the adversary may get information from a side channel about the termination of the protocol, e.g., she notices that the access is granted to the RFID-tag holder. We go one step forward in this paper and stress that the adversary may also hav...
The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Crypt...
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The c...
Part 3: Smart Cards and Embedded DevicesInternational audienceIn this paper, we propose a new varian...
Radio-Frequency IDentification (RFID) is the current trend allowing the identification and/or authen...
Abstract. Radio frequency identification systems based on low-cost computing devices is the new play...
The Publisher's final version can be found by following the DOI linkThe recent advent of ubiquitous ...
he recent advent of ubiquitous technologies has raised an important concern for citizens: the need t...
RFID is a technology that allows identification and authentication of objects or persons through the...
Abstract. Radio Frequency Identification (RFID) systems aim to identify objects in open environments...
International audienceThis paper establishes a novel model for RFID schemes where readers are not co...
This thesis aims to create a secure and practical RFID security framework, particularly on providing...
Existing RFID Privacy-Preserving Authentication (PPA) solutions mainly focus on the design of crypto...
Authentication protocol verification is a difficult problem. The problem of “state space explosion” ...
In side channel analysis, an attacker utilizes some legitimate function queries in order to collect...
After several years of research on cryptographic models for privacy in RFID systems, it appears that...
The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Crypt...
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The c...
Part 3: Smart Cards and Embedded DevicesInternational audienceIn this paper, we propose a new varian...
Radio-Frequency IDentification (RFID) is the current trend allowing the identification and/or authen...
Abstract. Radio frequency identification systems based on low-cost computing devices is the new play...
The Publisher's final version can be found by following the DOI linkThe recent advent of ubiquitous ...
he recent advent of ubiquitous technologies has raised an important concern for citizens: the need t...
RFID is a technology that allows identification and authentication of objects or persons through the...
Abstract. Radio Frequency Identification (RFID) systems aim to identify objects in open environments...
International audienceThis paper establishes a novel model for RFID schemes where readers are not co...
This thesis aims to create a secure and practical RFID security framework, particularly on providing...
Existing RFID Privacy-Preserving Authentication (PPA) solutions mainly focus on the design of crypto...
Authentication protocol verification is a difficult problem. The problem of “state space explosion” ...
In side channel analysis, an attacker utilizes some legitimate function queries in order to collect...
After several years of research on cryptographic models for privacy in RFID systems, it appears that...
The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Crypt...
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The c...
Part 3: Smart Cards and Embedded DevicesInternational audienceIn this paper, we propose a new varian...