2009 Third International Conference on Network and System Security 2009
DOI: 10.1109/nss.2009.15
|View full text |Cite
|
Sign up to set email alerts
|

Scalable RFID Pseudonym Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
18
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(18 citation statements)
references
References 13 publications
0
18
0
Order By: Relevance
“…[13] is a recently proposed protocol which claims to assure the untraceability, authentication, and robustness against replay and spoofing attacks. SSM assumes that the channel between the reader and the back-end server is secure, hence DB is considered as a single entity consists of the back-end server and the reader.…”
Section: Review Of the Protocolsmentioning
confidence: 99%
See 3 more Smart Citations
“…[13] is a recently proposed protocol which claims to assure the untraceability, authentication, and robustness against replay and spoofing attacks. SSM assumes that the channel between the reader and the back-end server is secure, hence DB is considered as a single entity consists of the back-end server and the reader.…”
Section: Review Of the Protocolsmentioning
confidence: 99%
“…A summary of SSM protocol is seen in Fig. 1, where an in depth description could be find in [13]. Notice that on the condition whether x is equal to x m or not, SSM puts the tags in two states.…”
Section: Review Of the Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…Consequently, in the last decade several RFID security protocols like in [1][2][3][4][5][6][7][8][9][10][11][12][13] have been presented and their security analysis have been investigated in various studies such as [14][15][16][17][18][19][20]. Although the mechanisms and details of each scheme can differ from each other dramatically, majority of these protocols have only focused on the security of the communication channel between the tags and the readers, since it is usually assumed that the readers and the back-end server are considered as a single and unique entity.…”
mentioning
confidence: 99%