2011
DOI: 10.1007/978-3-642-19348-4_17
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Scalable RFID Authentication Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Our proposal is partially based on the Fernández-Mir et al protocol [5] and consists of five phases: initialization, synchronized identification, desynchronized identification, update and ownership transfer. The update phase is executed after each successful identification.…”
Section: Our Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Our proposal is partially based on the Fernández-Mir et al protocol [5] and consists of five phases: initialization, synchronized identification, desynchronized identification, update and ownership transfer. The update phase is executed after each successful identification.…”
Section: Our Protocolmentioning
confidence: 99%
“…If the number of consecutive identifications by a desynchronized identification phase is greater than M AX, the server will not be able to identify the tag any more (denial of service). The value of the parameter M AX is extensively discussed in [5].…”
Section: Protocol Phasesmentioning
confidence: 99%