Development and Implementation of RFID Technology 2009
DOI: 10.5772/6529
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Mutual Authentication Protocol for Low-Cost RFID System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
(21 reference statements)
0
2
0
Order By: Relevance
“…This was identified when a VIP customer disassembled his card and recognized the embedded RFID chip. Over ten thousands customers' location privacy data became vulnerable to disclosure because the VIP card can be easily read by any unauthorized reader [4]. Similarly, the authors in [5] pointed out that the same benefit, which make the RFID system more appealing i.e.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This was identified when a VIP customer disassembled his card and recognized the embedded RFID chip. Over ten thousands customers' location privacy data became vulnerable to disclosure because the VIP card can be easily read by any unauthorized reader [4]. Similarly, the authors in [5] pointed out that the same benefit, which make the RFID system more appealing i.e.…”
Section: Introductionmentioning
confidence: 99%
“…In the recent past, many researchers have been looking into several innovative solutions for security and privacy in RFID systems [4], [7]- [10]. Many of these solutions use existing cryptographic operations such as public key cryptography, one way hash function, and symmetric key cryptography to accomplish data confidentiality, privacy, and integrity [11]- [13].…”
Section: Introductionmentioning
confidence: 99%