Proceedings of the First ACM Conference on Wireless Network Security 2008
DOI: 10.1145/1352533.1352556
|View full text |Cite
|
Sign up to set email alerts
|

RFID authentication protocol for low-cost tags

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
195
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 195 publications
(195 citation statements)
references
References 10 publications
0
195
0
Order By: Relevance
“…To facilitate verification of the correct solution to the puzzle, an anonymized version of the tag's identifier is used. Specifically, for pseudonym generation, we opt for the use of a hash function, one of the most common solutions in the literature [15,16,18,49,72,75,76]. The commitment scheme is also based on the use of a hash function.…”
Section: Performance Analysismentioning
confidence: 99%
“…To facilitate verification of the correct solution to the puzzle, an anonymized version of the tag's identifier is used. Specifically, for pseudonym generation, we opt for the use of a hash function, one of the most common solutions in the literature [15,16,18,49,72,75,76]. The commitment scheme is also based on the use of a hash function.…”
Section: Performance Analysismentioning
confidence: 99%
“…Song and Mitchell proposed an RFID authentication protocol (referred to here as the SM protocol) in 2008 [9].…”
Section: The Song-mitchell Protocolmentioning
confidence: 99%
“…Many protocols such as [23,29] have been designed to provide mutual authentication or tag authentication in RFID systems. These protocols can be used to prevent counterfeiting in supply chains.…”
Section: Introductionmentioning
confidence: 99%