Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address scalability issue in batch authentications. Deterministic approaches verify tags one by one, and the communication overhead and time cost grow linearly with increasing size of tags. We design a fast and scalable counterfeits estimation scheme, INformative Counting (INC), which achieves sublinear authentication time and communication cost in batch verifications. The key novelty of INC builds on an FM-Sketch variant authentication synopsis that can capture key counting information using only sublinear space. With the help of this well-designed data structure, INC is able to provide authe...
The Mafia fraud consists in an adversary transparently relaying the physical layer signal during an ...
Counterfeit products, particularly pharmaceuticals, electronic devices, and apparels, are widespread...
Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilit...
Many algorithms have been introduced to deterministically authenticate Radio Frequency Identificatio...
Radio Frequency Identification technology (RFID) is widely used in many applications, such as asset ...
RFID is a promising technology for anti-counterfeiting since it facilitates processing of product in...
RFID technology facilitates processing of product information, making it a promising technology for ...
Abstract—Cardinality estimation and tag authentication are two major issues in large-scale Radio Fre...
Cardinality estimation and tag authentication are two major issues in large-scale Radio Frequency Id...
MasterCounterfeiting is one of the most serious problems in the consumer market.One promising approa...
Counterfeiting is one of the most serious problems in the consumer market. One promising ap-proach f...
We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of probab...
With advancement in radio frequency identification (RFID), RFID-based track-and-trace anti-counter-f...
Abstract—Cloning attacks seriously impede the security of Radio-Frequency Identification (RFID) appl...
RFID facilitates processing of product information, making it a promising technology for anti-counte...
The Mafia fraud consists in an adversary transparently relaying the physical layer signal during an ...
Counterfeit products, particularly pharmaceuticals, electronic devices, and apparels, are widespread...
Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilit...
Many algorithms have been introduced to deterministically authenticate Radio Frequency Identificatio...
Radio Frequency Identification technology (RFID) is widely used in many applications, such as asset ...
RFID is a promising technology for anti-counterfeiting since it facilitates processing of product in...
RFID technology facilitates processing of product information, making it a promising technology for ...
Abstract—Cardinality estimation and tag authentication are two major issues in large-scale Radio Fre...
Cardinality estimation and tag authentication are two major issues in large-scale Radio Frequency Id...
MasterCounterfeiting is one of the most serious problems in the consumer market.One promising approa...
Counterfeiting is one of the most serious problems in the consumer market. One promising ap-proach f...
We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of probab...
With advancement in radio frequency identification (RFID), RFID-based track-and-trace anti-counter-f...
Abstract—Cloning attacks seriously impede the security of Radio-Frequency Identification (RFID) appl...
RFID facilitates processing of product information, making it a promising technology for anti-counte...
The Mafia fraud consists in an adversary transparently relaying the physical layer signal during an ...
Counterfeit products, particularly pharmaceuticals, electronic devices, and apparels, are widespread...
Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilit...