搜索结果: 1-10 共查到“军事学 RFID tags”相关记录10条 . 查询时间(0.03 秒)
Nowadays, RFID systems have earned an important place in our everyday lives. Its adoption is growing in areas where data security or privacy or both must be guaranteed. Since the RFID tag can be clone...
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses
RFID based supply chain clone detection authentication
2016/6/15
Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentic...
Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags
Authentication Yoking-Proof
2014/3/11
Peris-Lopez et al. recently provides some guidelines that should be followed to design a secure yoking-proof protocol. In addition, conforming to those guidelines and EPC C1 G2, they presented a yokin...
Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach
radio frequency identification RFID identification protocol privacy untraceability location privacy scalability
2012/3/29
In this paper, we propose a new approach to identify a tag of a RFID system in constant time while keeping untraceability to the tag. Our scheme does not use any cryptographic primitives. Instead, we ...
Grouping-Proof Protocol for RFID Tags:Security Definition and Scalable Construction
RFID Security Yoking-Proof Grouping-Proof Scalability
2009/12/29
In this paper, we propose a grouping-proof protocol
for RFID tags based on secret sharing. Our proposed
protocol addresses the scalability issue of the previous
protocols by removing the need for a...
Current work in RFID security focuses mainly on authentication
and privacy preserving identification. In this paper,
we discuss the possibility of widening the scope of RFID
security by introducing...
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
RFID privacy pseudonym protocol cryptography
2009/3/4
The ability to link two different sightings of the same Radio
Frequency Identification (RFID) tag enables invasions of privacy. The
problem is aggravated when an item, and the tag attached to it, ch...
RFID-Tags are small devices used for identification purposes in many applications nowadays.
It is expected that they will enable many new applications and link the physical and the virtual world in t...
We describe the rst power analysis attack on passive RFID tags. Compared to
standard power analysis attacks, this attack is unique in that it requires no physical
contact with the device under atta...
In this paper, we investigate an application of RFIDs referred to in the literature as the group scanning problem, in which several tags are “simultaneously” scanned by a reader. The security context ...