An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of the tag is instituted by the supplier who initially owns the tag. In the view of a buyer, the validity of the current tag ownership and the originality of supplier are most important. In typical RFID ownership transfer protocols, the knowledge of the tag's authentication key proves the ownership. However, it is insufficient against an active attacker, since tags are usually lack of tamper-proof protections. Ownership transfer relies on a successful verification of tag's supplier and current ownership. In this paper, we formally define the security model of ownership transfer protocols and propose a secure ownership transfer protocol. In our sc...
Much research has been done on preserving RFID tag owner\u27s location privacy. This research has pr...
Radio frequency identification (RFID) is a modern approach to identify and track several assets at o...
In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated agai...
An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of t...
Existing business models require RFID tag to transfer its ownership during its life cycle. As a resu...
RFID technology is increasingly become popular in supply chain management. When passing tags on to t...
Abstract. We present a formal model for stateful security protocols. This model is used to define ow...
Abstract: While a major of existing RFID security protocols address tag authentication issues, the a...
Abstract. In some applications, the bearer of a radio frequency identi-fication (RFID) tag might cha...
In the RFID system a tag is attached to an object which might own by a number of people during its l...
We present a formal model for stateful security protocols. This model is used to define ownership an...
Radio Frequency Identification (RFID) has been widely adopted in practice for objects identification...
In RFID system a tag is attached to an object which might own by a number of owners during its life ...
Providing security in passive RFID systems has gained significant attention due to their widespread ...
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag e...
Much research has been done on preserving RFID tag owner\u27s location privacy. This research has pr...
Radio frequency identification (RFID) is a modern approach to identify and track several assets at o...
In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated agai...
An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of t...
Existing business models require RFID tag to transfer its ownership during its life cycle. As a resu...
RFID technology is increasingly become popular in supply chain management. When passing tags on to t...
Abstract. We present a formal model for stateful security protocols. This model is used to define ow...
Abstract: While a major of existing RFID security protocols address tag authentication issues, the a...
Abstract. In some applications, the bearer of a radio frequency identi-fication (RFID) tag might cha...
In the RFID system a tag is attached to an object which might own by a number of people during its l...
We present a formal model for stateful security protocols. This model is used to define ownership an...
Radio Frequency Identification (RFID) has been widely adopted in practice for objects identification...
In RFID system a tag is attached to an object which might own by a number of owners during its life ...
Providing security in passive RFID systems has gained significant attention due to their widespread ...
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag e...
Much research has been done on preserving RFID tag owner\u27s location privacy. This research has pr...
Radio frequency identification (RFID) is a modern approach to identify and track several assets at o...
In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated agai...