RFID applications and security review
C Munoz-Ausecha, J Ruiz-Rosero… - Computation, 2021 - mdpi.com
Radio frequency identification (RFID) is widely used in several contexts, such as logistics,
supply chains, asset tracking, and health, among others, therefore drawing the attention of …
supply chains, asset tracking, and health, among others, therefore drawing the attention of …
Review of different classes of RFID authentication protocols
A Ibrahim, G Dalkılıc - Wireless Networks, 2019 - Springer
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations
of RFID technology are security and privacy concerns. Many methods, including encryption …
of RFID technology are security and privacy concerns. Many methods, including encryption …
Survivable RFID systems: Issues, challenges, and techniques
Y Zuo - IEEE Transactions on Systems, Man, and Cybernetics …, 2010 - ieeexplore.ieee.org
Radio frequency identification (RFID) technique has been applied in high-security and high-
integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID …
integrity settings such as national defense, healthcare, and citizen identification. A tiny RFID …
Attacks on RFID protocols
T Van Deursen, S Radomirović - Cryptology ePrint Archive, 2009 - discovery.dundee.ac.uk
This document consists of a collection of attacks upon RFID protocols and is meant to serve
as a quick and easy reference. This document will be updated as new attacks are found …
as a quick and easy reference. This document will be updated as new attacks are found …
Dynamic key-updating: Privacy-preserving authentication for RFID systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is
to allow valid readers to explicitly authenticate their dominated tags without leaking the …
to allow valid readers to explicitly authenticate their dominated tags without leaking the …
Scalable industry data access control in RFID-enabled supply chain
By attaching RFID tags to products, supply chain participants can identify products and
create product data to record the product particulars in transit. Participants along the supply …
create product data to record the product particulars in transit. Participants along the supply …
Integrating blockchain into supply chain safeguarded by PUF-enabled RFID
Due to globalization, supply chain networks are moving towards higher complexity and
becoming vulnerable to various kinds of attacks such as counterfeiting, information …
becoming vulnerable to various kinds of attacks such as counterfeiting, information …
Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems
RFID (radio frequency identification) technologies are poised to revolutionize retail,
warehouse and supply chain management. One of their interesting applications is to …
warehouse and supply chain management. One of their interesting applications is to …
Public-key encrypted bloom filters with applications to private set intersection
F Kerschbaum - US Patent 8,526,603, 2013 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on a computer
storage medium, for retrieving, from computer-readable memory, a set, the set including a …
storage medium, for retrieving, from computer-readable memory, a set, the set including a …
Attacks and improvements to an RIFD mutual authentication protocol and its extensions
In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also
extended this protocol for RFID tag ownership transfer. These two protocols are designed to …
extended this protocol for RFID tag ownership transfer. These two protocols are designed to …