2005
DOI: 10.1007/11601494_12
|View full text |Cite
|
Sign up to set email alerts
|

RFID System with Fairness Within the Framework of Security and Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…However, users usually prefer their location information to be kept secret, because their personal location information is regarded as sensitive. Therefore, only authorized entities should have access to users' location information, and only when necessary [15]. In this section, security and privacy requirements for the proposed system are described.…”
Section: Security and Privacy Requirements For The Proposed Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…However, users usually prefer their location information to be kept secret, because their personal location information is regarded as sensitive. Therefore, only authorized entities should have access to users' location information, and only when necessary [15]. In this section, security and privacy requirements for the proposed system are described.…”
Section: Security and Privacy Requirements For The Proposed Systemmentioning
confidence: 99%
“…For users' privacy, the EPC of the tag should not be known to the reader or system; only authentication of the tag should be provided. In addition, only authorized administrators should have access to location information, and only when necessary [15].…”
Section: Security and Privacy Requirements For The Proposed Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…It is easy to operate and has been widely applied in various industries. However, RFID featured with non-contact also brings a lot of insecurity factors [1][2] , mainly including unauthorized read, location tracking, eavesdropping, spoofing, replay attack, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Many insecurity factors, such as unauthorized read, location tracking, eavesdropping, spoofing, and replay attack, are brought in to RFID due to its use of non-contact automatic identification technology [1][2] . In order to solve security problems of RFID, scholars both at home and abroad have conducted intensive researches [3][4][5][6][7],including Hash Lock Protocol [5] proposed by Sarma et al, Randomized Hash-lock protocol proposed by Weis et al, and Hash chain protocol proposed by Ohkubo et al [7].…”
Section: Introductionmentioning
confidence: 99%