2006
DOI: 10.1007/11908739_11
|View full text |Cite
|
Sign up to set email alerts
|

Crossing Borders: Security and Privacy Issues of the European e-Passport

Abstract: Abstract. The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show which borders need to be crossed to improve the security and the privacy protection of the next generation of e-passports. In particular we discuss attacks on Basic Access Control due to the low entropy of the data from which the access keys are derived, we sketch the European proposals for Extended Access Control and the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
59
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 72 publications
(59 citation statements)
references
References 2 publications
0
59
0
Order By: Relevance
“…RFID tags can be very small and cheap [1] and can therefore be embedded in a wide variety of objects. They have, for instance, been embedded in passports [2] and there are plans to embed them in bank notes [3] and groceries [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…RFID tags can be very small and cheap [1] and can therefore be embedded in a wide variety of objects. They have, for instance, been embedded in passports [2] and there are plans to embed them in bank notes [3] and groceries [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…RFIDs are widely used in inventory control and supply chain management [1,7,18,19,25], in e-passports [12,6,11,15,20] e.g. for US' visa waiver policies, in contactless credit cards [10].…”
Section: Introductionmentioning
confidence: 99%
“…Despite much prior work in RFID security and certificate revocation, coupled with the fact that the problem had been spotted by researchers [17,19,16], little has been done to address reader PKC revocation and expiration checking problems. Only very recently, Nithyanand et al [28] proposed a method that entails user involvement and DERTs to determine PKC validity.…”
Section: Reader Revocation Checkingmentioning
confidence: 99%