Blar i Department of Informatics på emneord "RFID"
Viser treff 1-5 av 5
-
Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids
(Chapter, 2012)Recently, a new privacy-preserving elliptic curve based grouping proof protocol with colluding tag prevention( CTP) has been proposed. The CTP protocol is claimed to be resistant against colluding tags attacks in which the ... -
On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs
(Chapter, 2011)In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated against the tag owners as adversaries. The first protocol called ROTIV is a scheme which provides a privacy-preserving ownership ... -
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
(Conference lecture, 2012)As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to HB, ... -
Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
(Journal article, 2011)Recently, Alomair et al. proposed the first Un- Conditionally Secure mutual authentication protocol for lowcost RFID systems(UCS-RFID). The security of the UCSRFID relies on five dynamic secret keys which are updated at ... -
Security Analysis of two Distance-Bounding Protocols
(Conference lecture, 2012)In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestimated. ...