Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013
DOI: 10.1145/2462096.2462109
|View full text |Cite
|
Sign up to set email alerts
|

Gps+

Abstract: Security and privacy for RFID systems are very challenging topics. First, the RFID passive tags prevailing in most of the RFID applications are very limited in processing power, thus making most of the ordinary security mechanisms inappropriate. Second, tags do answer to any reader requests, for this the most innovative RFID proposed protocols are not suitable whether for privacy problems or the high cost of tags. So far, a variety of public-key identification/authentication protocols have been proposed, but n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 12 publications
0
0
0
Order By: Relevance