• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 833
Next 10 →

Untraceable Tags based on Mild Assumptions

by Carlo Blundo, Angelo De Caro , 2009
"... Radio frequency identification (RFID) chips have been widely deployed in large-scale systems such as inventory control and supply chain management. While RFID technology has much advantage, however it may create new problems to privacy. Tag untraceability is a significant concern that needs to be ad ..."
Abstract - Add to MetaCart
to be addressed in deploying RFID-based system. In this paper we propose a new construction for untraceable tags. Our construction is the first construction in the symmetric bilinear setting based on a mild assumption. That is our assumption is tautological in the generic group model and is “efficiently

A Scalable and Untraceable Authentication Protocol for RFID

by Youngjoon Seo, Hyunrok Lee, Kwangjo Kim
"... Abstract. RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduces scalability of RFID. Guaranteeing untraceability and scalability at the same time is so critical in order to ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
Abstract. RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduces scalability of RFID. Guaranteeing untraceability and scalability at the same time is so critical in order

Multiple Object Identification with Passive RFID Tags

by Harald Vogt , 2002
"... We investigate the applicability of passive RFID systems to the task of identifying multiple tagged objects simultaneously, assuming that the number of tags is not known in advance. We present a combinatorial model of the communication mechanism between the reader device and the tags, and use this m ..."
Abstract - Cited by 177 (0 self) - Add to MetaCart
We investigate the applicability of passive RFID systems to the task of identifying multiple tagged objects simultaneously, assuming that the number of tags is not known in advance. We present a combinatorial model of the communication mechanism between the reader device and the tags, and use

Untraceable RFID Tags via Insubvertible Encryption ABSTRACT

by unknown authors
"... We introduce a new cryptographic primitive, called insubvertible encryption, that produces ciphertexts which can be randomized without the need of any key material. Unlike plain universal re-encryption schemes, insubvertible encryption prevents against adversarial exploitation of hidden channels, by ..."
Abstract - Add to MetaCart
, by including certificates proving that the ciphertext can only be decrypted by authorized parties. The scheme can be applied to RFID tags, providing strong protection against tracing. This enables post-sale applications of manufacturer-issued RFID tags while preserving the privacy of consumers

Untraceable RFID Tags via Insubvertible Encryption ABSTRACT

by unknown authors
"... We introduce a new cryptographic primitive, called insubvertible encryption, that produces ciphertexts which can be randomized without the need of any key material. Unlike plain universal re-encryption schemes, insubvertible encryption prevents against adversarial exploitation of hidden channels, by ..."
Abstract - Add to MetaCart
, by including certificates proving that the ciphertext can only be decrypted by authorized parties. The scheme can be applied to RFID tags, providing strong protection against tracing. This enables post-sale applications of manufacturer-issued RFID tags while preserving the privacy of consumers

S.: Algebraic attacks on RFID protocols

by Ton Van Deursen, Sjouke Mauw - In: Proc. 3rd Workshop in Information Security Theory and Practices: Smart Devices, Pervasive Systems, and Ubiquitous Networks. Volume 5746 of Lecture Notes in Computer Science , 2009
"... Abstract. We give an intuitive formal definition of untraceability in the standard Dolev-Yao intruder model, inspired by existing definitions of anonymity. We show how to verify whether communication proto-cols satisfy the untraceability property and apply our methods to known RFID protocols. We sho ..."
Abstract - Cited by 19 (1 self) - Add to MetaCart
Abstract. We give an intuitive formal definition of untraceability in the standard Dolev-Yao intruder model, inspired by existing definitions of anonymity. We show how to verify whether communication proto-cols satisfy the untraceability property and apply our methods to known RFID protocols. We

M.: Untraceability in the applied pi calculus

by Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan - In: proc. of the 1st Int. Workshop on RFID Security and Cryptography , 2009
"... The use of RFID tags in personal items, such as passports, may make it possible to track a person’s movements. Even RFID protocols that encrypt their identity may leak enough information to let an attacker trace a tag. In this paper we define strong and weak forms of untraceablility, and illustrate ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
these definitions with a simple example. We formally define these concepts in the applied pi-calculus which in some cases makes it possible to automatically check if an RFID tag running a particular protocol is untraceable. database reader reader tag tag tag tag tag tag tag tag 1

Low-Cost Untraceable Authentication Protocols for RFID [Extended and corrected version] ∗ ABSTRACT

by Yong Ki Lee, Dave Singelée, Lejla Batina, Ingrid Verbauwhede
"... The emergence of pervasive computing devices has raised several privacy issues. In this paper, we address the risk of tracking attacks in RFID networks. Our contribution is threefold: (1) We repair the revised EC-RAC protocols of Lee, Batina and Verbauwhede and show that our improved authentication ..."
Abstract - Cited by 16 (3 self) - Add to MetaCart
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we address the risk of tracking attacks in RFID networks. Our contribution is threefold: (1) We repair the revised EC-RAC protocols of Lee, Batina and Verbauwhede and show that our improved authentication

Formal verification of privacy for RFID systems

by Mayla Brusó, Konstantinos Chatzikokolakis, Jerry Den Hartog
"... Abstract. RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their wireless nature, introduces privacy concerns as a tag could leak information about the owner’s behaviour. In t ..."
Abstract - Cited by 28 (2 self) - Add to MetaCart
. In this paper we define two privacy notions, untraceability and forward privacy, using a formal model based on the applied pi calculus, and we show the relationship between them. Then we focus on a generic class of simple privacy protocols, giving sufficient and necessary conditions for untraceability

1 Untraceable RFID Authentication Protocols: Revision of EC-RAC

by Yong Ki Lee, Lejla Batina, Ingrid Verbauwhede
"... Abstract — Radio Frequency IDentification (RFID) systems are steadily becoming paramount due to their vast applications such as supply chains, inventory, tolling, baggage management, access control etc. While they have potentials to improve our lives, they also present a privacy risk. Privacy is oft ..."
Abstract - Cited by 13 (1 self) - Add to MetaCart
Abstract — Radio Frequency IDentification (RFID) systems are steadily becoming paramount due to their vast applications such as supply chains, inventory, tolling, baggage management, access control etc. While they have potentials to improve our lives, they also present a privacy risk. Privacy
Next 10 →
Results 1 - 10 of 833
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University