2015
DOI: 10.1016/j.jcss.2014.12.015
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability aware graphs for RFID protocol security benchmarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…This entails that both parties have to manage certificates of authorization for accessing to the EPC-IS, ONS, among others. In addition, for the reader-to-tag communications, a data encryption algorithm must be used and shared by the parties, suppliers, and supermarket [50][51][52].…”
Section: Guide Of Good Practices For Implementing An Rfid-uhf System mentioning
confidence: 99%
See 1 more Smart Citation
“…This entails that both parties have to manage certificates of authorization for accessing to the EPC-IS, ONS, among others. In addition, for the reader-to-tag communications, a data encryption algorithm must be used and shared by the parties, suppliers, and supermarket [50][51][52].…”
Section: Guide Of Good Practices For Implementing An Rfid-uhf System mentioning
confidence: 99%
“…The current security and privacy challenges focus on the establishment and management of keys, certificates of authorization, and the use of cryptographic algorithms for encrypting reader-to-tag communications [50][51][52].…”
mentioning
confidence: 99%