User menu

Provably secure grouping-proofs for RFID tags

Bibliographic reference Burmester, M. ; de Medeiros, B. ; Motta, R.. Provably secure grouping-proofs for RFID tags.Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008 (London, UK, 8-11 September 2008). In: Grimaud, G.; Standaert, F.-X.;, Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, Springer-verlag2008, p. 176-190
Permanent URL http://hdl.handle.net/2078.1/67650
  1. Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID tags via insubvertible encryption. In: Atluri, V., Meadows, C., Juels, A. (eds.) Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 92–101. ACM, New York (2005)
  2. Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol. In: 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), pp. 110–114. IEEE Computer Society, Los Alamitos (2005)
  3. Bellare Mihir, Rogaway Phillip, Random oracles are practical : a paradigm for designing efficient protocols, 10.1145/168588.168596
  4. Bolotnyy Leonid, Robins Gabriel, Generalized "Yoking-Proofs" for a Group of RFID Tags, 10.1109/mobiqw.2006.361727
  5. Bono, S.C., Green, M., Stubblefield, A., Juels, A., Rubin, A.D., Szydlo, M.: Security analysis of a cryptographically-enabled RFID device. In: Proc. USENIX Security Symposium (USENIX Security 2005), pp. 1–16. USENIX (2005)
  6. Burmester, M., van Le, T., de Medeiros, B.: Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In: Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006), IEEE Press, Los Alamitos (2006)
  7. Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Proc. IEEE Intern. Conf. on Security and Privacy in Communication Networks (SECURECOMM 2005). IEEE Press, Los Alamitos (2005)
  8. Dimitriou, T.: A secure and efficient RFID protocol that can make big brother obsolete. In: Proc. Intern. Conf. on Pervasive Computing and Communications (PerCom 2006). IEEE Press, Los Alamitos (2006)
  9. Engberg, S.J., Harning, M.B., Jensen, C.D.: Zero-knowledge device authentication: Privacy & security enhanced rfid preserving business value and consumer convenience. In: Proceedings of Second Annual Conference on Privacy, Security and Trust (PST 2004), October 13-15, 2004, pp. 89–101. Wu Centre, University of New Brunswick, Fredericton (2004)
  10. EPC Global. EPC tag data standards, vs. 1.3, http://www.epcglobalinc.org/standards/EPCglobal_Tag_Data_Standard_TDS_%Version_1.3.pdf
  11. ISO/IEC, http://www.hightechaid.com/standards/18000.htm
  12. Juels A., "Yoking-proofs" for RFID tags, 10.1109/percomw.2004.1276920
  13. Van Le, T., Burmester, M., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Bao, F., Miller, S. (eds.) Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), Singapore, March 20-22, 2007, pp. 242–252. ACM, New York (2007)
  14. Molnar David, Soppera Andrea, Wagner David, A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags, Selected Areas in Cryptography (2006) ISBN:9783540331087 p.276-290, 10.1007/11693383_19
  15. Oren, Y., Shamir, A.: Power analysis of RFID tags. In: RSA Conference, Cryptographer’s Track (RSA-CT 2006) (2006), http://www.wisdom.weizmann.ac.il/~yossio/rfid
  16. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Solving the simultaneous scanning problem anonymously: clumping proofs for RFID tags. In: Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerl 2007, Istambul, Turkey, IEEE Computer Society Press, Los Alamitos (2007)
  17. Piramuthu, S.: On existence proofs for multiple RFID tags. In: IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing – SecPerU 2006, Lyon, France, June 2006. IEEE Computer Society Press, Los Alamitos (2006)
  18. Saito, J., Sakurai, K.: Grouping Proof for RFID Tags. In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, Taiwan, 28-30 March 2005, pp. 621–624. IEEE Computer Society, Los Alamitos (2005)
  19. Sarma Sanjay E., Weis Stephen A., Engels Daniel W., RFID Systems and Security and Privacy Implications, Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.454-469, 10.1007/3-540-36400-5_33
  20. Tan Chiu C., Sheng Bo, Li Qun, Severless Search and Authentication Protocols for RFID, 10.1109/percom.2007.30
  21. Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), Pisa, Italy, 13-17 March 2006, pp. 640–643. IEEE Computer Society, Los Alamitos (2006)
  22. Vajda, I., Buttyan, L.: Lightweight authentication protocols for low-cost RFID tags. In: Proc. Workshop on Security in Ubiquitous Computing (UBICOMP 2003) (2003)