RFID Security: Tradeoffs between Security and Efficiency
From MaRDI portal
Publication:5458948
DOI10.1007/978-3-540-79263-5_20zbMATH Open1138.94359OpenAlexW2103076929MaRDI QIDQ5458948FDOQ5458948
Authors: Michael Pedersen, Ivan B. Damgård
Publication date: 24 April 2008
Published in: Topics in Cryptology – CT-RSA 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-79263-5_20
Recommendations
Cited In (12)
- Reducing Time Complexity in RFID Systems
- On Privacy Models for RFID
- Vulnerability aware graphs for RFID protocol security benchmarking
- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
- RFID authentication efficient proactive information security within computational security
- Information Security and Cryptology
- Intrusion detection model for RFID system based on immune network
- RFID Privacy Based on Public-Key Cryptography
- Minimalist cryptography for low-cost RFID tags (extended abstract)
- Title not available (Why is that?)
- New Security Problem in RFID Systems “Tag Killing”
- Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
This page was built for publication: RFID Security: Tradeoffs between Security and Efficiency
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458948)